Sciweavers

483 search results - page 24 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
67
Voted
AINA
2008
IEEE
15 years 4 months ago
Annulling SYN Flooding Attacks with Whitelist
SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests...
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H...
GLOBECOM
2009
IEEE
15 years 4 months ago
Evaluating DoS Attacks against Sip-Based VoIP Systems
Abstract—The multimedia communication is rapidly converging towards Voice over Internet – commonly known as Voice over Internet Protocol (VoIP). Session Initiation Protocol (SI...
M. Zubair Rafique, M. Ali Akbar, Muddassar Farooq
TRUSTBUS
2007
Springer
15 years 3 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson
BMCBI
2010
193views more  BMCBI 2010»
14 years 9 months ago
caGrid Workflow Toolkit: A Taverna based workflow tool for cancer Grid
Background: In biological and medical domain, the use of web services made the data and computation functionality accessible in a unified manner, which helped automate the data pi...
Wei Tan, Ravi K. Madduri, Aleksandra Nenadic, Stia...
ALPIT
2007
IEEE
15 years 3 months ago
Model Driven and Service Oriented Enterprise Integration---The Method, Framework and Platform
SOA and MDA have emerged as a major evolutionary step in enterprise integration. Significant advances have been seen in SOA and MDA. But the integration of SOA and MDA is still la...
Shuangxi Huang, Yushun Fan