This paper describes iNetSim, a universally accessible network simulator, created to allow vision-impaired and sighted users to complete Cisco Certified Network Associate level tw...
J. Hope, Brian R. von Konsky, I. Murray, L. C. Che...
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...
—A variety of wireless network technologies have been developed and deployed, including GSM, UMTS, WiFi and WiMAX. The advantages of having an integrated heterogeneous wireless n...