Sciweavers

357 search results - page 55 / 72
» Performance Comparison of Security Mechanisms for Grid Servi...
Sort
View
VLDB
2007
ACM
119views Database» more  VLDB 2007»
15 years 7 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
ICS
2003
Tsinghua U.
15 years 6 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
147
Voted
WSE
2002
IEEE
15 years 6 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
COMCOM
2007
149views more  COMCOM 2007»
15 years 1 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
HICSS
2005
IEEE
165views Biometrics» more  HICSS 2005»
15 years 7 months ago
A QoS Based Model for Supporting Multimedia Applications over Cellular IP
With the increasing use of real-time multimedia applications over IP networks, efficient use of resources, especially in wireless networks, is becoming a necessity. In order to ha...
Elwalid Sidahmed, Hesham H. Ali