Sciweavers

706 search results - page 129 / 142
» Access Control: Policies, Models, and Mechanisms
Sort
View
EDO
2005
Springer
14 years 1 months ago
Optimizing layered middleware
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
WMASH
2003
ACM
14 years 22 days ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
14 years 1 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...
TMC
2008
175views more  TMC 2008»
13 years 7 months ago
An Empirical Study on the Capacity and Performance of 3G Networks
This paper presents the findings of an extensive measurement study on multiple commercial third-generation (3G) networks. We have investigated the performance of those 3G networks ...
Wee Lum Tan, Fung Lam, Wing Cheong Lau
APWEB
2008
Springer
13 years 8 months ago
Protecting Information Sharing in Distributed Collaborative Environment
Abstract. Information sharing on distributed collaboration usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure mann...
Min Li, Hua Wang