WiMAX has attracted a lot of attention recently in the telecommunication community including researchers, product developers and service providers. Numerous papers have been publis...
Raj Jain, Chakchai So-In, and Abdel-Karim Al Tamim...
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
The migration from 3rd generation mobile communication networks to 4th generation, purely IP-based networks leads to new chances, but also great risks for the traditional mobile n...
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...