Sciweavers

483 search results - page 28 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
15 years 3 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan
USS
2008
14 years 12 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
JEC
2006
113views more  JEC 2006»
14 years 9 months ago
CyNC: A method for real time analysis of systems with cyclic data flows
The paper addresses a novel method for realtime analysis of systems with cyclic data flows. The presented method is based on Network Calculus principles, where upper and lower flo...
Henrik Schiøler, Jens Dalsgaard Nielsen, Ki...
79
Voted
ACISICIS
2007
IEEE
15 years 3 months ago
Towards Agent Based Web Service
Web Service (WS) technology represents a fundamental shift in the way web applications are developed for e-business. It is becoming the next paradigm to deploy business services o...
Manish Chhabra, Hongen Lu
SFM
2009
Springer
150views Formal Methods» more  SFM 2009»
15 years 4 months ago
Contract-Based Discovery and Composition of Web Services
In the context of Service Oriented Computing behavioural contracts are descriptions of the observable message-passing behaviour of services. In other terms, contracts are behaviour...
Mario Bravetti, Gianluigi Zavattaro