Sciweavers

1386 search results - page 173 / 278
» Towards mature IT services
Sort
View
SIGCOMM
2012
ACM
13 years 2 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...
INFOCOM
2012
IEEE
13 years 2 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
ESORICS
2009
Springer
16 years 14 days ago
The Coremelt Attack
Current Denial-of-Service (DoS) attacks are directed towards a specific victim. The research community has devised several countermeasures that protect victim hosts against undesir...
Ahren Studer, Adrian Perrig
CCGRID
2009
IEEE
15 years 6 months ago
Multi-scale Real-Time Grid Monitoring with Job Stream Mining
—The ever increasing scale and complexity of large computational systems ask for sophisticated management tools, paving the way toward Autonomic Computing. A first step toward A...
Xiangliang Zhang, Michèle Sebag, Céc...
AINA
2008
IEEE
15 years 6 months ago
A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks
In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the...
Julien Haillot, Frédéric Guidec