Sciweavers

2429 search results - page 214 / 486
» Using Aspects to Design a Secure System
Sort
View
217
Voted
JCIT
2010
181views more  JCIT 2010»
14 years 10 months ago
Geospatial Web Services Semantic Discovery Approach Using Quality
The use of geographic data through Web services shows the geospatial Web Services (GWS). A growing number of GWS designed to interoperate spatial information over the network have...
Rezeg Khaled, Laskri Mohamed Tayeb, Sylvie Servign...
115
Voted
WWW
2007
ACM
16 years 4 months ago
Integrating value-based requirement engineering models to webml using vip business modeling framework
Requirement engineering (RE) is emerging as an increasingly important discipline for supporting Web application development, as these are designed to satisfy diverse stakeholder n...
Farooque Azam, Zhang Li, Rashid Ahmad
183
Voted
ACMSE
2008
ACM
15 years 5 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
142
Voted
CCR
2002
113views more  CCR 2002»
15 years 3 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
118
Voted
ESORICS
2007
Springer
15 years 9 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...