Sciweavers

2904 search results - page 217 / 581
» Internet Infrastructure Security
Sort
View
EKNOW
2010
14 years 11 months ago
Workshop-Based Risk Assessment for the Definition of Secure Business Processes
Nowadays, industry and governments are faced with an increasing number of varying threats concerning the security of their valuable business processes. Due to the vast damage pote...
Thomas Neubauer, Markus Pehn
SIGCOMM
2012
ACM
13 years 6 months ago
MultiNet: usable and secure WiFi device association
This demo presents MultiNet, a novel method for joining devices to a domestic Wi-Fi network. MultiNet dynamically reconfigures the network to accept each device, rather than con...
Anthony Brown, Richard Mortier, Tom Rodden
WWW
2009
ACM
16 years 4 months ago
REST-based management of loosely coupled services
Applications increasingly make use of the distributed platform that the World Wide Web provides ? be it as a Software-as-a-Service such as salesforce.com, an application infrastru...
Heiko Ludwig, Jim Laredo, Kamal Bhattacharya, Lili...
107
Voted
SIGCOMM
2006
ACM
15 years 10 months ago
In VINI veritas: realistic and controlled network experimentation
This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides ...
Andy C. Bavier, Nick Feamster, Mark Huang, Larry L...
ICPW
2007
15 years 5 months ago
Rule responder: RuleML-based agents for distributed collaboration on the pragmatic web
The Rule Responder project (responder.ruleml.org) extends the Semantic Web towards a Pragmatic Web infrastructure for collaborative human-computer networks. These allow semi-autom...
Adrian Paschke, Harold Boley, Alexander Kozlenkov,...