Sciweavers

351 search results - page 18 / 71
» Building Secure and Reliable Network Applications
Sort
View
AWCC
2004
Springer
15 years 5 months ago
Securing Multicast Groups in Ad Hoc Networks
Group communication in multicast environment has been a growing importance in ad hoc networks, and providing secure communication in the group is essential in many ad hoc applicat...
Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kri...
EUSAI
2007
Springer
15 years 6 months ago
Evaluating Confidence in Context for Context-Aware Security
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or...
Marc Lacoste, Gilles Privat, Fano Ramparany
EDBT
2008
ACM
147views Database» more  EDBT 2008»
15 years 12 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 5 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
TON
2008
102views more  TON 2008»
14 years 11 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya