Ieeeproject - ieeeproject.in - IEEE projects 2015 Chennai, IEEE projects 2015 - 2016 Trichy, IEEE 2015 Java Projects for M.E/M.Tech, IEEE 2015 Dot net Projects for M.E/M.Tech, IEEE 2015 Power electronics Projects for M.E/M.Tech, Matlab, Embedded, NS2 Projects

Latest News:

Discovery and Resolution of Anomalies in Web Access Control Policies 27 Aug 2013 | 07:55 pm

Emerging computing technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still...

A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 26 Aug 2013 | 11:15 am

Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement to the federation with other clouds. Performance evalu...

ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 24 Aug 2013 | 12:14 pm

Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. However, existing anonymous rou...

A generic framework for constructing encounter-based social Networks 23 Aug 2013 | 11:00 am

In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-...

Memory access virtualization to deal with stack buffer overflow attacks 22 Aug 2013 | 11:13 am

In this paper we presented Memory access virtualization is a key mechanism we used to deal with stack buffer overflow attacks. The key technique of our solution is to virtualize memory accesses and mo...

executing computations on untrusted machines in a trustworthy manner 21 Aug 2013 | 11:38 am

We present sTile, a technique for building software systems that distribute large computations onto the cloud while providing guarantees that the cloud nodes cannot learn the computation’s private dat...

Facilitates systematic detection and resolution of XACML policy anomalies 20 Aug 2013 | 10:20 am

In this paper, we represent an innovative policy anomaly analysis approach for Web access control policies, focusing on XACML (eXtensible Access Control Markup Language) policy.We introduce a policy b...

Authorization Security model conceived to secure access to Semantic repositories 17 Aug 2013 | 11:27 am

Most semantic repositories are designed to manage semantic models but do not deal with access rights. As in the case of databases that are traditional, data stored inside a semantic database should be...

Detecting Distributed Reflection DoS Attacks based on Rank Correlation 16 Aug 2013 | 01:37 pm

DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attacker...

Measuring Time required to compromise a computer system 15 Aug 2013 | 11:27 am

In this paper three measurement methods – the time between compromises, the time to first compromise and the overall time to compromise .A frequent assumption in the domain of cyber security is that c...

Recently parsed news:

Recent searches: