Sciweavers

1587 search results - page 298 / 318
» Access Control for Shared Resources
Sort
View
MOBIHOC
2005
ACM
14 years 10 months ago
Link-layer salvaging for making routing progress in mobile ad hoc networks
IEEE 802.11 MAC, called the Distributed Coordination Function (DCF), employs carrier sensing to effectively avoid collisions, but this makes it difficult to maximally reuse the sp...
Chansu Yu, Kang G. Shin, Lubo Song
ATAL
2008
Springer
14 years 28 days ago
On the importance of migration for fairness in online grid markets
Computational grids offer users a simple access to tremendous computer resources for solving large scale computing problems. Traditional performance analysis of scheduling algorit...
Lior Amar, Ahuva Mu'alem, Jochen Stößer
CCS
2008
ACM
14 years 28 days ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
TMC
2008
134views more  TMC 2008»
13 years 10 months ago
A Hybrid Token-CDMA MAC Protocol for Wireless Ad Hoc Networks
Token passing medium access control (MAC) protocols are gaining interest amongst wireless ad hoc network researchers as they provide unrivalled advantages over the existing IEEE 80...
I-Sheng Liu, Fambirai Takawira, Hong-Jun Xu
ACSAC
2000
IEEE
14 years 3 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao