Sciweavers

1351 search results - page 121 / 271
» Trust in Anonymity Networks
Sort
View
ICECCS
2010
IEEE
162views Hardware» more  ICECCS 2010»
13 years 10 months ago
Trust-Based Adaptation in Complex Service-Oriented Systems
Abstract—Complex networks consisting of humans and software services, such as Web-based social and collaborative environments, typically require flexible and context-based inter...
Florian Skopik, Daniel Schall, Schahram Dustdar
TCSV
2008
298views more  TCSV 2008»
13 years 10 months ago
TrustStream: A Secure and Scalable Architecture for Large-Scale Internet Media Streaming
Abstract--To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues o...
Hao Yin, Chuang Lin, Qian Zhang, Zhijia Chen, Dape...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 2 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
IFIPTM
2009
127views Management» more  IFIPTM 2009»
13 years 7 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp
AINA
2009
IEEE
14 years 4 months ago
TopDNS: Experiences Building Internet-Based Topologies with GNP
Building realistic Internet topologies is an important step towards predicting the behavior of new distributed applications and protocols. We are creating topologies that predict ...
Gert Pfeifer, Christof Fetzer