Sciweavers

18 search results - page 2 / 4
» Designing an overload control strategy for secure e-commerce...
Sort
View
DEXA
2005
Springer
176views Database» more  DEXA 2005»
13 years 11 months ago
Control-Based Quality Adaptation in Data Stream Management Systems
Unlike processing snapshot queries in a traditional DBMS, the processing of continuous queries in a data stream management system (DSMS) needs to satisfy quality requirements such ...
Yi-Cheng Tu, Mohamed Hefeeda, Yuni Xia, Sunil Prab...
INFOCOM
2005
IEEE
13 years 11 months ago
Dependency isolation for thread-based multi-tier Internet services
— Multi-tier Internet service clusters often contain complex calling dependencies among service components spreading across cluster nodes. Without proper handling, partial failur...
Lingkun Chu, Kai Shen, Hong Tang, Tao Yang, Jingyu...
TRIDENTCOM
2010
IEEE
13 years 3 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
DRM
2003
Springer
13 years 10 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
SACMAT
2006
ACM
13 years 11 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...