Sciweavers

1140 search results - page 72 / 228
» A Purpose-Based Access Control Model
Sort
View
ICC
2009
IEEE
149views Communications» more  ICC 2009»
13 years 5 months ago
Adoption of Cognitive Radio Scheme to Class-Based Call Admission Control
Abstract--By using cognitive radio technology, opportunistic spectrum access has the potential to solve the underused spectrum problem. In this paper, we employ class-based call ad...
Dongyue Xue, Hui Yu, Xinbing Wang, Hsiao-Hwa Chen
WICOMM
2011
13 years 3 months ago
The effects of shadow-fading on QoS-aware routing and admission control protocols designed for multi-hop MANETs
—Providing quality-of-service (QoS) assurances in a mobile ad hoc network (MANET) is difficult due to node mobility, contention for channel access, a lack of centralised coordin...
Lajos Hanzo, Rahim Tafazolli
ACSAC
2000
IEEE
14 years 17 days ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
APWEB
2011
Springer
12 years 11 months ago
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...
WCNC
2010
IEEE
13 years 6 months ago
Interference Modeling for Cognitive Radio Networks with Power or Contention Control
—In this paper, we present an interference model for cognitive radio (CR) networks employing power control or contention control scheme. The probability density functions (PDFs) ...
Zengmao Chen, Cheng-Xiang Wang, Xuemin Hong, John ...