Sciweavers

3418 search results - page 610 / 684
» Security for Grid Services
Sort
View
IADIS
2004
13 years 10 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
WIS
2004
13 years 10 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
COMCOM
2006
121views more  COMCOM 2006»
13 years 9 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
SAC
2006
ACM
13 years 8 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
GIS
2010
ACM
13 years 7 months ago
Investigation of aggregation effects in vegetation condition monitoring at a national scale
Monitoring vegetation condition is an important issue in the Mediterranean region, in terms of both securing food and preventing fires. Vegetation indices (VIs), mathematical tran...
T. K. Alexandridis, T. Katagis, I. Z. Gitas, N. G....