Sciweavers

2442 search results - page 176 / 489
» Secure Service Orchestration
Sort
View

Publication
145views
15 years 1 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
ICECCS
2002
IEEE
99views Hardware» more  ICECCS 2002»
15 years 10 months ago
Using Aspects to Design a Secure System
Developers of complex systems have to address concerns such as security, availability of services, and timeliness that often are non-orthogonal to traditional design structures, t...
Geri Georg, Indrakshi Ray, Robert B. France
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
15 years 9 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
348
Voted
HICSS
2011
IEEE
386views Biometrics» more  HICSS 2011»
14 years 8 months ago
Cloud Hooks: Security and Privacy Issues in Cloud Computing
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that...
Wayne A. Jansen
PERCOM
2006
ACM
16 years 4 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins