Sciweavers

1426 search results - page 282 / 286
» Analyzing Web Service Based Business Processes
Sort
View
IJNSEC
2008
201views more  IJNSEC 2008»
14 years 11 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
SEMWEB
2007
Springer
15 years 5 months ago
ASMOV Results for OAEI 2007
Numerous ontology alignment algorithms have appeared in the literature in recent years, but only a few make use of the semantics enclosed within the ontologies in order to improve ...
Yves R. Jean-Mary, Mansur R. Kabuka
ICDE
2008
IEEE
193views Database» more  ICDE 2008»
16 years 1 months ago
DescribeX: Interacting with AxPRE Summaries
DescribeX is a visual, interactive tool for exploring the underlying structure of an XML collection. DescribeX implements a framework for creating XML summaries described using axi...
Mir Sadek Ali, Mariano P. Consens, Shahan Khatchad...
91
Voted
ICICS
2005
Springer
15 years 5 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
93
Voted
CCS
2001
ACM
15 years 4 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé