Sciweavers

9588 search results - page 15 / 1918
» Service Value Networks
Sort
View
CCECE
2006
IEEE
14 years 3 months ago
Detecting Distributed Denial of Service Attack Traffic at the Agent Machines
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We be...
Vicky Laurens, Abdulmotaleb El-Saddik, Pulak Dhar,...
ICDIM
2007
IEEE
14 years 4 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...
JCIT
2007
142views more  JCIT 2007»
13 years 9 months ago
Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to...
Sanjay Raghani, Durga Toshniwal
AICT
2006
IEEE
120views Communications» more  AICT 2006»
14 years 3 months ago
Business Processes Characterisation Through Definition of Structural and Non-Structural Criteria
Workflow and Web Services have the main role in the development and in the realisation of B2B architectures. In this context, the principal target is to compose many services supp...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 4 months ago
Service Roaming over Mobile Networks: A Reality Check
—Today, international mobile roaming (IMR) is experiencing changes both in terms of technology and business models. Traditionally, voice and SMS have been the only services offer...
K. R. Renjish Kumar