A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks

ST Zargar, J Joshi, D Tipper - IEEE communications surveys & …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …

Security issues in mobile code systems

DM Chess - Mobile agents and security, 1998 - Springer
In mobile code systems, programs or processes travel from host to host in order to
accomplish their goals. Such systems violate some of the assumptions that underlie most …

IKP: Turning a PKI around with decentralized automated incentives

S Matsumoto, RM Reischuk - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Despite a great deal of work to improve the TLS PKI, CA misbehavior continues to occur,
resulting in unauthorized certificates that can be used to mount man-in-the-middle attacks …

[PDF][PDF] Modeling cyber-insurance: towards a unifying framework.

R Böhme, G Schwartz - WEIS, 2010 - infosecon.net
We propose a comprehensive formal framework to classify all market models of cyber-
insurance we are aware of. The framework features a common terminology and deals with …

On death, taxes, and the convergence of peer-to-peer and grid computing

I Foster, A Iamnitchi - Peer-to-Peer Systems II: Second International …, 2003 - Springer
It has been reported [25] that life holds but two certainties, death and taxes. And indeed, it
does appear that any society-and in the context of this article, any large-scale distributed …

Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures

O Ogbanufe, DJ Kim, MC Jones - Information & management, 2021 - Elsevier
Given the financial consequences of security breaches, security risk management has
gained more attention in board rooms and garnered more involvement from top …

SNAP: A protocol for negotiating service level agreements and coordinating resource management in distributed systems

K Czajkowski, I Foster, C Kesselman, V Sander… - … Strategies for Parallel …, 2002 - Springer
A fundamental problem in distributed computing is to map activities such as computation or
data transfer onto resources that meet requirements for performance, cost, security, or other …

Computational grids: Invited talk

I Foster, C Kesselman - International Conference on Vector and Parallel …, 2000 - Springer
In this introductory chapter, we lay the groundwork for the rest of the book by providing a
more detailed picture of the expected purpose, shape, and architecture of future grid …

Practical protocols for certified electronic mail

RH Deng, L Gong, AA Lazar, W Wang - Journal of network and systems …, 1996 - Springer
Electronic mail, or e-mail, has brought us a big step closer towards the vision of paperless
offices. To advance even closer to this vision, however, it is essential that existing e-mail …

Accountability in electronic commerce protocols

R Kailar - IEEE Transactions on software engineering, 1996 - ieeexplore.ieee.org
In most commercial and legal transactions, the ability to hold individuals or organizations
accountable for transactions is important. Hence, electronic protocols that implement …