Sciweavers

IEEEARES
2006
IEEE
14 years 6 months ago
Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability Uncertainty
In many reliability studies based on data, reliability engineers face incompleteness and incoherency problems in the data. Probabilistic tools badly handle these kinds of problems...
Christophe Simon, Philippe Weber
IEEEARES
2006
IEEE
14 years 6 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon
IEEEARES
2006
IEEE
14 years 6 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
IEEEARES
2006
IEEE
14 years 6 months ago
Active/Active Replication for Highly Available HPC System Services
Christian Engelmann, Stephen L. Scott, Chokchai Le...
IEEEARES
2006
IEEE
14 years 6 months ago
Censorship-Resistant and Anonymous P2P Filesharing
We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Inst...
Regine Endsuleit, Thilo Mie
IEEEARES
2006
IEEE
14 years 6 months ago
Testing Complex Business Process Solutions
—Today’s business climate requires you to constantly evolve IT strategies responding to new opportunities or threats. While the fundamentals of IT - reliability, availability, ...
Gerd Saurer, Alexander Schatten
IEEEARES
2006
IEEE
14 years 6 months ago
Secure 3G User Authentication in Adhoc Serving Networks
The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a pr...
Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard...
IEEEARES
2006
IEEE
14 years 6 months ago
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
IEEEARES
2006
IEEE
14 years 6 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
IEEEARES
2006
IEEE
14 years 6 months ago
No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies
Efforts have been put for electronization of complementary currencies (alternative forms of monetary media) in the hope that it would reduce their operational cost. However, this ...
Kenji Saito, Eiichi Morino, Jun Murai