Sciweavers

6907 search results - page 335 / 1382
» Securing distributed adaptation
Sort
View
EDCC
1994
Springer
15 years 9 months ago
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
Security and reliability issues in distributed systems have been investigated for several years at LAAS using a technique called Fragmentation-Redundancy-Scattering (FRS). The aim ...
Jean-Charles Fabre, Yves Deswarte, Brian Randell
ICDCS
2010
IEEE
15 years 8 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
IPPS
2005
IEEE
15 years 10 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
PERCOM
2003
ACM
16 years 4 months ago
Mobile Link Services with MQSeries Everyplace
The Open Hypermedia model is based upon the separation of hypertext links from documents and treats them as separate entities. Distributed link services take this approach and imp...
Sanjay Vivek, Kenneth Tso, David De Roure
ICIP
2008
IEEE
15 years 11 months ago
A novel video encryption technique based on secret sharing
The rapid growth of the Internet and digitized content made video distribution simpler. Hence the need for video data protection is on the rise. In this paper, we propose a secure...
Chigullapally Narsimha Raju, Ganugula Umadevi, Kan...