Sciweavers

DSOM
2006
Springer
14 years 3 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
DSOM
2006
Springer
14 years 3 months ago
Ontology-Based Policy Refinement Using SWRL Rules for Management Information Definitions in OWL
Abstract. The goal of ontology-based management is to improve the manageability of network resources through the application of formal ontologies. Prior research work has studied t...
Antonio Guerrero, Víctor A. Villagrá...
DSN
2006
IEEE
14 years 3 months ago
Efficient High Hamming Distance CRCs for Embedded Networks
Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter weight checksum techn...
Justin Ray, Philip Koopman
DSN
2006
IEEE
14 years 3 months ago
Empirical and Analytical Evaluation of Systems with Multiple Unreliable Servers
We construct, analyze and solve models of systems where a number of servers offer services to an incoming stream of demands. Each server goes through alternating periods of being ...
Jennie Palmer, Isi Mitrani
DSN
2006
IEEE
14 years 3 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
DSN
2006
IEEE
14 years 3 months ago
Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance
This paper presents our experience validating the flood tolerance of two network interface card (NIC)-based embedded firewall solutions, the Embedded Firewall (EFW) and the Autono...
Michael Ihde, William H. Sanders
DSN
2006
IEEE
14 years 3 months ago
Lucky Read/Write Access to Robust Atomic Storage
This paper establishes tight bounds on the best-case time-complexity of distributed atomic read/write storage implementations that tolerate worst-case conditions. We study asynchr...
Rachid Guerraoui, Ron R. Levy, Marko Vukolic
DSN
2006
IEEE
14 years 3 months ago
Efficiently Detecting All Dangling Pointer Uses in Production Servers
In this paper, we propose a novel technique to detect all dangling pointer uses at run-time that is efficient enough for production use in server codes. One idea (previously used ...
Dinakar Dhurjati, Vikram S. Adve