Sciweavers

534 search results - page 12 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
VTC
2006
IEEE
113views Communications» more  VTC 2006»
14 years 1 months ago
Implementation of a Multihoming Agent for Mobile On-board Communication
— A research topic that is becoming increasingly popular is that of on-board mobile communication, where users on a vehicle are connected to a local network that attaches to the ...
Jun Yao, Yi Duan, Jianyu Pan, Kun-Chan Lan
SACMAT
2004
ACM
14 years 23 days ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
ACSAC
2009
IEEE
13 years 11 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
SUTC
2006
IEEE
14 years 1 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
JSAC
2008
254views more  JSAC 2008»
13 years 7 months ago
Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings Over Cognitive Radio Wireless Networks
We propose the cross-layer based opportunistic multi-channel medium access control (MAC) protocols, which integrate the spectrum sensing at physical (PHY) layer with the packet sch...
Hang Su, Xi Zhang