Sciweavers

712 search results - page 31 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
WWW
2005
ACM
14 years 9 months ago
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact wit...
Mudhakar Srivatsa, Li Xiong, Ling Liu
ICIW
2009
IEEE
14 years 3 months ago
BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business
When considering Web services’ (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especial...
Jason R. C. Nurse, Jane Sinclair
WIMOB
2008
IEEE
14 years 3 months ago
Cross-Layer Self Routing: A Self-Managed Routing Approach for MANETs
—Mobile ad hoc networks (MANETs) generally adopt a peer-to-peer architecture in which the nodes themselves provide routing and services to the network. Disconnectivity with peer ...
Mohammad Abdur Razzaque, Simon Dobson, Paddy Nixon
WWIC
2009
Springer
191views Communications» more  WWIC 2009»
14 years 3 months ago
Hop-to-Hop Reliability in IP-Based Wireless Sensor Networks - A Cross-Layer Approach
Abstract. To interconnect a wireless sensor network (WSN) to the Internet, we propose to use TCP/IP as the standard protocol for all network entities. We present a cross layer desi...
Gerald Wagenknecht, Markus Anwander, Torsten Braun
GCC
2003
Springer
14 years 1 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou