Sciweavers

IPCCC
2006
IEEE
14 years 6 months ago
Maille authorization - a distributed, redundant authorization protocol
The Maille Authorization protocol provides flexible and reliable authorization in large distributed and pervasive computing systems. Service owners distribute their access control...
Andrew Fritz, Jehan-François Pâris
IPCCC
2006
IEEE
14 years 6 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
IPCCC
2006
IEEE
14 years 6 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
IPCCC
2006
IEEE
14 years 6 months ago
Towards a framework for worm-defense evaluation
Computer worms are a serious problem. Much research has been done to detect and contain worms. One major deficiency in most research is that the claims are supported by theoretic...
Senthilkumar G. Cheetancheri, Denys L. Ma, Karl N....
IPCCC
2006
IEEE
14 years 6 months ago
Automatically deducing propagation sequences that circumvent a collaborative worm defense
We present an approach to the question of evaluating worm defenses against future, yet unseen and possibly defense-aware worm behavior. Our scheme employs model checking to produc...
Linda Briesemeister, Phillip A. Porras
IPCCC
2006
IEEE
14 years 6 months ago
Voice over application-level multicast
Nick Blundell, Norbert Egi, Laurent Mathy
IPCCC
2006
IEEE
14 years 6 months ago
Cluster based approaches for end-to-end complete feedback collection in multicast
In this paper we study the end-to-end complete feedback collection (ECFC) problem in large scale multicast applications. We consider the case where each receiver is expected to se...
Mehmet Baysan, Kamil Saraç
IPCCC
2006
IEEE
14 years 6 months ago
Energy-efficient cooperative routing in multi-hop wireless ad hoc networks
We study the routing problem for multi-hop wireless ad hoc networks based on cooperative transmission. We prove that the Minimum Energy Cooperative Path (MECP) routing problem, i....
Fulu Li, Kui Wu, Andrew Lippman
IPCCC
2006
IEEE
14 years 6 months ago
AWARDS: an adaptive write strategy for secure local disk systems
Since security is of critical importance for modern storage systems, it is imperative to protect stored data from being tampered or disclosed. Although an increasing number of sec...
Mais Nijim, Xiao Qin, Tao Xie 0004, Mohammed I. Al...