Sciweavers

212 search results - page 28 / 43
» Consistent policy enforcement in distributed systems using m...
Sort
View
INFOCOM
2009
IEEE
15 years 8 months ago
Distributed Storage Management of Evolving Files in Delay Tolerant Ad Hoc Networks
— This work focuses on a class of distributed storage systems whose content may evolve over time. Each component or node of the storage system is mobile and the set of all nodes ...
Eitan Altaian, Philippe Nain, Jean-Claude Bermond
COLCOM
2007
IEEE
15 years 7 months ago
SYNG: A middleware for statefull groupware in mobile environments
— Computer supported collaboration systems, or groupware, are being used more and more in the real life. In the recent years, we are witnessing an increasing demand for supportin...
M. Ionescu, I. Marsic
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
15 years 6 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 5 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
IEEESCC
2008
IEEE
15 years 7 months ago
Adaptive Secure Access to Remote Services
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
Hanping Lufei, Weisong Shi, Vipin Chaudhary