Sciweavers

2057 search results - page 55 / 412
» Distributed Secure Systems: Then and Now
Sort
View
MIDDLEWARE
2007
Springer
15 years 7 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
109
Voted
ESOP
2005
Springer
15 years 6 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
CCS
2000
ACM
15 years 5 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
NCM
2010
14 years 11 months ago
Blink: Large-scale P2P network monitoring and visualization system using VM introspection
P2P network is now widely pervasive and increase usability of Internet. However, with the difficulty of tracing flow of P2P traffic, security incident of P2P network is now ser...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
135
Voted
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 4 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...