ions and concepts that let applications access and share resources and services across distributed, wide area networks, while providing common security semantics, distributed resou...
Ian T. Foster, Carl Kesselman, Jeffrey M. Nick, St...
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
Abstract— Optimizing TCP (Transport Layer) for mobility has been researched extensively. We present a brief summary of existing results which indicates that most schemes require ...
Tom Goff, James Moronski, Dhananjay S. Phatak, Vip...
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
This paper describes a communication-minded visualization called progressive multiples that supports both the forensic analysis and presentation of multidimensional event data. We...