Sciweavers

ACSW
2006
14 years 28 days ago
Key research issues in grid workflow verification and validation
In the grid architecture, a grid workflow system is a type of high-level grid middleware which is supposed to support modelling, redesign and execution of large-scale sophisticate...
Jinjun Chen, Yun Yang
ACSW
2006
14 years 28 days ago
Modelling denial of service attacks on JFK with Meadows's cost-based framework
We present the first detailed application of Meadows's cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two ...
Jason Smith, Juan Manuel González Nieto, Co...
ACSW
2006
14 years 28 days ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
ACSW
2006
14 years 28 days ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
ACSW
2006
14 years 28 days ago
A simplified approach to web service development
Most languages used for developing web services and clients exhibit properties which make calling remote functions across a network a non-trivial task. The type systems used by ob...
Peter M. Kelly, Paul D. Coddington, Andrew L. Wend...
ACSW
2006
14 years 28 days ago
Towards dynamic data grid framework for eResearch
The scale at which scientific data is produced will undergo a massive change in the near future. Many sophisticated scientific discovery laboratories or the installation of sensor...
A. B. M. Russel, Asad I. Khan
ACSW
2006
14 years 28 days ago
Analysis of traceback techniques
Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's ...
Udaya Kiran Tupakula, Vijay Varadharajan
ACSW
2006
14 years 28 days ago
Event sequence mining to develop profiles for computer forensic investigation purposes
Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators ca...
Tamas Abraham
ACSW
2004
14 years 28 days ago
Mining Association Rules from XML Data using XQuery
In recent years XML has became very popular for representing semistructured data and a standard for data exchange over the web. Mining XML data from the web is becoming increasing...
Jacky W. W. Wan, Gillian Dobbie
ACSW
2004
14 years 28 days ago
On the Security of Some Proxy Blind Signature Schemes
A proxy blind signature scheme is a digital signature scheme which combines the properties of proxy signature and blind signature schemes. Recently, Tan et al. proposed two proxy ...
Hung-Min Sun, Bin-Tsan Hsieh