Sciweavers

441 search results - page 31 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
14 years 3 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
ECSA
2008
Springer
14 years 22 days ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...
ICNP
2002
IEEE
14 years 3 months ago
Attacking DDoS at the Source
Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. We propose D-WARD, a DDoS defense system deployed at source-end networks that autonomously detects an...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher
COMPSAC
2009
IEEE
14 years 3 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
EURODAC
1995
IEEE
202views VHDL» more  EURODAC 1995»
14 years 2 months ago
Hardware-software co-synthesis of fault-tolerant real-time distributed embedded systems
Distributed systems are becoming a popular way of implementing many embedded computing applications, automotive control being a common and important example. Such embedded systems...
Santhanam Srinivasan, Niraj K. Jha