Sciweavers

NSPW
2006
ACM
14 years 5 months ago
Large-scale collection and sanitization of network security data: risks and challenges
Over the last several years, there has been an emerging interest in the development of widearea data collection and analysis centers to help identify, track, and formulate respons...
Phillip A. Porras, Vitaly Shmatikov
NSPW
2006
ACM
14 years 5 months ago
A pact with the devil
We study malware propagation strategies which exploit not the incompetence or naivety of users, but instead their own greed, malice and short-sightedness. We demonstrate that inter...
Mike Bond, George Danezis
NSPW
2006
ACM
14 years 5 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
NSPW
2006
ACM
14 years 5 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
NSPW
2006
ACM
14 years 5 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
NSPW
2006
ACM
14 years 5 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
SKG
2006
IEEE
14 years 5 months ago
Dynamic Setting, Verification and Adjustment of Upper Bound Constraints in Grid Workflow Systems
Upper bound constraints are often set when complex scientific or business processes are modelled as grid workflow specifications. However, many existing processes such as climate ...
Jinjun Chen, Yun Yang
SKG
2006
IEEE
14 years 5 months ago
Multi-layer Grid Portal Architecture Based on Mobile Agent
Many Grid portal architectures have three layers: browser, portal and Grid environment. We design a multi-layer Grid portal architecture, which introduced Mobile Agent; the mobile...
Fang Juan
SKG
2006
IEEE
14 years 5 months ago
Identifying Community Structure in Semantic Peer-to-Peer Networks
The research community has turned to create Semantic Overlay Networks for information retrieval in large scale peer-to-peer networks. Much research work in semantic overlay protoc...
Hanhua Chen, Hai Jin
SKG
2006
IEEE
14 years 5 months ago
A Survey of Cache/Proxy for Transparent Data Replication
Web caching is an important technology for reducing Internet access latency, alleviating network traffic, and spreading server load. An important issue that affects the performa...
Yingwei Jin, Wenyu Qu, Keqiu Li