Sciweavers

2172 search results - page 300 / 435
» Distributed User Access Control in Sensor Networks
Sort
View
136
Voted
ENTCS
2008
130views more  ENTCS 2008»
15 years 5 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
IPPS
2007
IEEE
15 years 11 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
ICDCSW
2007
IEEE
15 years 11 months ago
A P2P Groupware Framework based on Operational Transformations
- Groupware applications deal with propagation of changes to networked users, consistency maintenance on concurrent access, and provision of awareness. We have built a P2P groupwar...
Leandro Quiroga, Alejandro Fernandez
124
Voted
DSN
2000
IEEE
15 years 9 months ago
Towards Continuous Availability of Internet Services through Availability Domains
The increasing number of Internet users has caused a dramatic increase in electronic commerce. This growth is outpacing technologies for dependability causing traditional views of...
Nicholas S. Bowen, Daniel C. Sturman, Tina Ting Li...
158
Voted
ICDCS
1997
IEEE
15 years 9 months ago
Effect of Connection Rerouting on Application Performance in Mobile Networks
—The increasing deployment of wireless access technology, along with the emergence of high speed integrated service networks, such as ATM, promises to provide mobile users with u...
Partho Pratim Mishra, Mani B. Srivastava