Sciweavers

2904 search results - page 424 / 581
» Internet Infrastructure Security
Sort
View
CORR
2004
Springer
127views Education» more  CORR 2004»
15 years 3 months ago
Monitoring, Analyzing, and Controlling Internet-scale Systems with ACME
Analyzing and controlling large distributed services under a wide range of conditions is difficult. Yet these capabilities are essential to a number of important development and o...
David L. Oppenheimer, Vitaliy Vatkovskiy, Hakim We...
MANSCI
2008
169views more  MANSCI 2008»
15 years 3 months ago
Service Adoption and Pricing of Content Delivery Network (CDN) Services
Content Delivery Networks (CDNs) are a vital component of the Internet's content delivery value chain, servicing nearly a third of the Internet's most popular content si...
Kartik Hosanagar, John C.-I. Chuang, Ramayya Krish...
ESORICS
2009
Springer
16 years 4 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...
ESORICS
2009
Springer
16 years 4 months ago
Cumulative Attestation Kernels for Embedded Systems
1 There are increasing deployments of networked embedded systems and rising threats of malware intrusions on such systems. To mitigate this threat, it is desirable to enable common...
Michael LeMay, Carl A. Gunter
142
Voted
SOSP
2003
ACM
16 years 21 days ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...