Sciweavers

859 search results - page 70 / 172
» Security for Key Management Interfaces
Sort
View
CCS
2000
ACM
14 years 2 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
DSOM
2004
Springer
14 years 3 months ago
Autonomous Management of Clustered Server Systems Using JINI
Abstract. A framework for the autonomous management of clustered server systems called LAMA1 (Large-scale system’s Autonomous Management Agent) is proposed in this paper. LAMA is...
Chul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park
AICCSA
2006
IEEE
143views Hardware» more  AICCSA 2006»
14 years 4 months ago
An Innovative Self-Configuration Approach for Networked Systems and Applications
The increased complexity, heterogeneity and the dynamism of networked systems and services make current control and management tools to be ineffective in managing and securing suc...
Huoping Chen, Salim Hariri, Fahd Rasul
INFOCOM
2008
IEEE
14 years 4 months ago
A New Perspective on Internet Security using Insurance
—Managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods (such as firewalls, intrusion dete...
Jean-Chrysostome Bolot, Marc Lelarge
ISI
2005
Springer
14 years 3 months ago
Map-Mediated GeoCollaborative Crisis Management
Managing crises requires collecting geographical intelligence and making spatial decisions through collaborative efforts among multiple, distributed agencies and task groups. Crisi...
Guoray Cai, Alan M. MacEachren, Isaac Brewer, Mich...