Sciweavers

2199 search results - page 96 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
114
Voted
FGCS
2008
159views more  FGCS 2008»
15 years 21 days ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
92
Voted
DSN
2005
IEEE
15 years 6 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
105
Voted
AINA
2009
IEEE
15 years 7 months ago
Social Network-Based Trust for Agent-Based Services
— In service-oriented environments, reputation-based service selection is gaining increasing prominence. We propose in this paper a social network-based approach to model and ana...
Jamal Bentahar, Babak Khosravifar, Maziar Gomrokch...
131
Voted
IJISEC
2006
119views more  IJISEC 2006»
15 years 19 days ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
ATAL
2005
Springer
15 years 6 months ago
Agent-based integration of Web Services with Workflow Management Systems
Rapid changes in the business environment call for more flexible and adaptive workflow systems. Researchers have proposed that Workflow Management Systems (WfMSs) comprising multi...
Bastin Tony Roy Savarimuthu, Maryam Purvis, Martin...