Sciweavers

6137 search results - page 224 / 1228
» Securing Collaborative Applications
Sort
View
ISM
2006
IEEE
253views Multimedia» more  ISM 2006»
15 years 8 months ago
Gossip Based Streaming with Incentives for Peer Collaboration
— Peer-to-peer (P2P) systems are becoming a popular means of streaming audio and video content but they are prone to bandwidth starvation if selfish peers do not contribute band...
Sachin Agarwal, Shruti Dube
EEE
2005
IEEE
15 years 8 months ago
From Multi-Context Business Collaboration Models to Context-Specific ebXML BPSS
UN/CEFACT’s Modelling Methodology (UMM) is used to analyze and design B2B business processes. We extend UMM by a constraint mechanism for adding business environment-specific co...
Birgit Hofreiter, Christian Huemer
158
Voted
CCS
2009
ACM
15 years 9 months ago
Towards secure dataflow processing in open distributed systems
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
130
Voted
SIGCOMM
1997
ACM
15 years 6 months ago
Iolus: A Framework for Scalable Secure Multicasting
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not t the point-to-point mod...
Suvo Mittra
110
Voted
CCS
2008
ACM
15 years 4 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger