Sciweavers

8493 search results - page 1342 / 1699
» Implementing a distributed firewall
Sort
View
EUROSYS
2010
ACM
15 years 10 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
124
Voted
PASTE
2010
ACM
15 years 10 months ago
Expect the unexpected: error code mismatches between documentation and the real world
Inaccurate documentation can mislead programmers and cause software to fail in unexpected ways. We examine mismatches between documented and actual error codes returned by 42 Linu...
Cindy Rubio-González, Ben Liblit
ACSAC
2002
IEEE
15 years 10 months ago
GOSSIB vs. IP Traceback Rumors
Abstract—To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms relying on probabilistic packet marking ...
Marcel Waldvogel
COMPSAC
2002
IEEE
15 years 10 months ago
Private Information Retrieval in the Presence of Malicious Failures
In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenge...
Erica Y. Yang, Jie Xu, Keith H. Bennett
DANCE
2002
IEEE
15 years 10 months ago
Towards Self-Configuring Networks
Current networks require ad-hoc operating procedures by expert administrators to handle changes. These configuration management operations are costly and error prone. Active netwo...
Alexander V. Konstantinou, Danilo Florissi, Yechia...
« Prev « First page 1342 / 1699 Last » Next »