Sciweavers

1043 search results - page 95 / 209
» Monitoring Service
Sort
View
PEWASUN
2004
ACM
15 years 9 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
133
Voted
DISCEX
2003
IEEE
15 years 9 months ago
Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies
Under sponsorship of the Defense Advanced Research Projects Agency’s (DARPA) Fault Tolerant Networks (FTN) program, The Johns Hopkins University Applied Physics Laboratory (JHU/...
W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. ...
DIM
2009
ACM
15 years 8 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
125
Voted
INFOCOM
1994
IEEE
15 years 8 months ago
An Algorithm for Optimal Service Provisioning using Resource Pricing
We propose a microeconomic approach to service provisioning in ATM networks. Our provisioning procedure consists of two algorithms, one executed by the network and the other by in...
Steven H. Low, Pravin Varaiya
ICDS
2007
IEEE
15 years 8 months ago
A Practical Synthesis of Dynamic Role Settings in Telecare Services
- Role provisioning is an essential yet complex aspect of the design of virtual organisations. This paper addresses an even more complex scenario, that of role provisioning in tele...
Ying Liu, Jean Bacon