Sciweavers

1129 search results - page 156 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
EUROSYS
2011
ACM
14 years 1 months ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...
ISCA
2006
IEEE
154views Hardware» more  ISCA 2006»
15 years 3 months ago
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors
This paper presents a high-availability system architecture called INDRA — an INtegrated framework for Dependable and Revivable Architecture that enhances a multicore processor ...
Weidong Shi, Hsien-Hsin S. Lee, Laura Falk, Mrinmo...
IWCMC
2010
ACM
15 years 3 months ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
WAC
2004
Springer
149views Communications» more  WAC 2004»
15 years 3 months ago
BIONETS: BIO-inspired NExt generaTion networkS
The amount of information in the new emerging all-embracing pervasive environments will be enormous. Current Internet protocol conceived almost forty years ago, were never planned ...
Iacopo Carreras, Imrich Chlamtac, Hagen Woesner, C...
GLOBECOM
2008
IEEE
14 years 10 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...