Sciweavers

7741 search results - page 31 / 1549
» Security in Active Networks
Sort
View
CACM
2004
212views more  CACM 2004»
13 years 8 months ago
The Spinning Cube of Potential Doom
Darknets are often proposed to monitor for anomalous, externally sourced traffic, and require large, contiguous blocks of unused IP addresses - not always feasible for enterprise ...
Stephen Lau
CN
2006
87views more  CN 2006»
13 years 9 months ago
Lightweight thread tunnelling in network applications
Abstract. Active Network nodes are increasingly being used for nontrivial processing of data streams. These complex network applications typically benefit from protection between t...
Austin Donnelly
ACSAC
1999
IEEE
14 years 1 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin
ICDCS
2006
IEEE
14 years 3 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper