Sciweavers

1029 search results - page 174 / 206
» A security framework for personal networks
Sort
View
CCR
2005
97views more  CCR 2005»
14 years 11 months ago
On the robustness of router-based denial-of-service (DoS) defense systems
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
Ying Xu, Roch Guérin
SACMAT
2011
ACM
14 years 2 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
115
Voted
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
14 years 2 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala
TAPIA
2005
ACM
15 years 5 months ago
The challenges of ambient collaboration
Collaborative capabilities are a hallmark of a new generation of networked applications. While traditional collaboration puts the computer in the foreground to help users interfac...
Hans-Peter Dommel
WWIC
2010
Springer
183views Communications» more  WWIC 2010»
15 years 4 months ago
Enhanced Mobility Support for Roaming Users: Extending the IEEE 802.21 Information Service
Many cell-phones and Personal Digital Assistants (PDAs) are equipped with multiple radio interfaces. Because of this, devices need to have ways of efficiently selecting the most su...
Karl Andersson, Andrea G. Forte, Henning Schulzrin...