: Almost all current P2P applications are built as monolithic systems: they tightly couple application software with an underlying P2P technology. For simple P2P applications like ...
Michael Conrad, Jochen Dinger, Hannes Hartenstein,...
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a we...
Identity management and federation is becoming an ever present problem in large multi-institutional environments. By their nature, Grids span multiple institutional administration...
Stephen Langella, Scott Oster, Shannon Hastings, F...