Sciweavers

26496 search results - page 5132 / 5300
» An Approach to Computing Ethics
Sort
View
P2P
2008
IEEE
149views Communications» more  P2P 2008»
15 years 4 months ago
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
Brent Lagesse, Mohan Kumar, Matthew Wright
P2P
2008
IEEE
15 years 4 months ago
On the Impact of Greedy Strategies in BitTorrent Networks: The Case of BitTyrant
The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt greedy approaches aiming at exploiting the intrinsic altruis...
Damiano Carra, Giovanni Neglia, Pietro Michiardi
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 4 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
SRDS
2008
IEEE
15 years 4 months ago
Systematic Structural Testing of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. As the quality of protection provided by a firewall dire...
JeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu
SRDS
2008
IEEE
15 years 4 months ago
Probabilistic Failure Detection for Efficient Distributed Storage Maintenance
Distributed storage systems often use data replication to mask failures and guarantee high data availability. Node failures can be transient or permanent. While the system must ge...
Jing Tian, Zhi Yang, Wei Chen, Ben Y. Zhao, Yafei ...
« Prev « First page 5132 / 5300 Last » Next »