Sciweavers

19 search results - page 4 / 4
» Multilevel Secure Rules and Its Impact on the Design of Acti...
Sort
View
ESORICS
2008
Springer
13 years 7 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
ACSW
2006
13 years 7 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
WECWIS
2002
IEEE
112views ECommerce» more  WECWIS 2002»
13 years 10 months ago
Separating Business Process from User Interaction Utilizing Process-Aware XSLT Style-Sheets
In the web context, it is difļ¬cult to disentangle presentation from process logic, and sometimes even data is not separate from the presentation. Consequently, it becomes to deļ...
Karl Aberer, Anwitaman Datta, Zoran Despotovic
SIGCOMM
2005
ACM
13 years 11 months ago
Declarative routing: extensible routing with declarative queries
The Internetā€™s core routing infrastructure, while arguably robust and eļ¬ƒcient, has proven to be diļ¬ƒcult to evolve to accommodate the needs of new applications. Prior researc...
Boon Thau Loo, Joseph M. Hellerstein, Ion Stoica, ...