Sciweavers

2560 search results - page 66 / 512
» Securing VO Management
Sort
View
VLDB
2002
ACM
74views Database» more  VLDB 2002»
15 years 3 months ago
Provisions and Obligations in Policy Management and Security Applications
Policies are widely used in many systems and applications. Recently, it has been recognized that a "yes/no" response to every scenario is just not enough for many modern...
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wan...
143
Voted
LCN
1999
IEEE
15 years 8 months ago
An Integrated Software Immune System: A Framework for Automated Network Management, System Health, and Security
Maintaining the integrity of large-scale networks is becoming an increasingly daunting task as networks expand at an unprecedented rate. The majority of present network monitoring...
Michael Gilfix
134
Voted
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 10 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
COCOON
2009
Springer
15 years 10 months ago
Approximation Algorithms for Key Management in Secure Multicast
Agnes Hui Chan, Rajmohan Rajaraman, Zhifeng Sun, F...