Sciweavers

6844 search results - page 1240 / 1369
» Web Service Security
Sort
View
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 3 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
SISW
2003
IEEE
15 years 3 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
15 years 3 months ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
ELPUB
2003
ACM
15 years 3 months ago
Building a Federated, Online Social Sciences and Humanities Database of Journals and Research Communication: A Canadian Initiati
: Synergies is an emerging online Canadian publishing project in the social sciences and humanities that builds on a group of online publishing initiatives that have emerged over t...
Rowland Lorimer, Richard Smith
ICOIN
2003
Springer
15 years 3 months ago
Do Not Trust All Simulation Studies of Telecommunication Networks
Since the birth of ARPANET and the first commercial applications of computer networks, through explosion of popularity of the Internet and wireless communications, we have witnes...
Krzysztof Pawlikowski
« Prev « First page 1240 / 1369 Last » Next »