Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
Quantitative techniques have traditionally been used to assess software architectures. We have found that early in the development process there is often insufficient quantitative...
Abstract: Managing services on the Internet is becoming more and more complex and time consuming for service providers since services are increasing both in number and complexity. ...
Ron A. M. Sprenkels, Aiko Pras, Bert-Jan van Beijn...
: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
A new context management framework, which supports the interaction between different domain context managers, is proposed. Two different context producerconsumer patterns are defin...