Sciweavers

483 search results - page 21 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
SACMAT
2003
ACM
15 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
WISEC
2009
ACM
15 years 4 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
EGC
2005
Springer
15 years 3 months ago
Implementation of Federated Databases Through Updatable Views
We present a new approach to the grid technology that is based on federated databases and updatable views. Views are used in two ways: (1) as wrappers of local servers that adopt l...
Hanna Kozankiewicz, Krzysztof Stencel, Kazimierz S...
96
Voted
ICDCS
2009
IEEE
14 years 7 months ago
Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing
In recent years, there are substantial demands to reduce packet loss in the Internet. Among the schemes proposed, finding backup paths in advance is considered to be an effective ...
Meijia Hou, Dan Wang, Mingwei Xu, Jiahai Yang
BMCBI
2007
105views more  BMCBI 2007»
14 years 9 months ago
VaxiJen: a server for prediction of protective antigens, tumour antigens and subunit vaccines
Background: Vaccine development in the post-genomic era often begins with the in silico screening of genome information, with the most probable protective antigens being predicted...
Irini A. Doytchinova, Darren R. Flower