Sciweavers

1737 search results - page 74 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
MONET
2010
148views more  MONET 2010»
13 years 7 months ago
REP: Location Privacy for VANETs Using Random Encryption Periods
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which ...
Albert Wasef, Xuemin (Sherman) Shen
MOBICOM
2004
ACM
14 years 2 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
STORAGESS
2005
ACM
14 years 2 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
ICSE
2009
IEEE-ACM
14 years 3 months ago
Integrating sustainability in decision-making processes: A modelling strategy
One of the most difficult problems that humanity currently faces is the sustainable development of our society, i.e. how to meet the needs of the present without compromising the...
Jordi Cabot, Steve M. Easterbrook, Jennifer Horkof...
SOSP
2009
ACM
14 years 6 months ago
Fabric: a platform for secure distributed computation and storage
Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share bot...
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Luc...