Sciweavers

1446 search results - page 246 / 290
» Network Access Control (NAC)
Sort
View
IMC
2006
ACM
15 years 9 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
161
Voted
ICC
2007
IEEE
214views Communications» more  ICC 2007»
15 years 10 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
129
Voted
SIGMOD
2003
ACM
123views Database» more  SIGMOD 2003»
16 years 3 months ago
The hyperion project: from data integration to data coordination
We present an architecture and a set of challenges for peer database management systems. These systems team up to build a network of nodes (peers) that coordinate at run time most...
Marcelo Arenas, Vasiliki Kantere, Anastasios Kemen...
PERCOM
2005
ACM
16 years 3 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
111
Voted
NDSS
2009
IEEE
15 years 10 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao