Sciweavers

534 search results - page 25 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
HOTNETS
2010
13 years 2 months ago
CloudPolice: taking access control out of the network
Cloud computing environments impose new challenges on access control techniques due to multi-tenancy, the growing scale and dynamicity of hosts within the cloud infrastructure, an...
Lucian Popa 0002, Minlan Yu, Steven Y. Ko, Sylvia ...
JSAC
2011
137views more  JSAC 2011»
13 years 2 months ago
Cognitive Network Interference
—Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause...
Alberto Rabbachin, Tony Q. S. Quek, Hyundong Shin,...
DCOSS
2006
Springer
13 years 11 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li
POLICY
2007
Springer
14 years 1 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
INSIGHT: Internet-Sensor Integration for Habitat Monitoring
We present our experience with designing, developing, and deploying of an Internet accessible wireless sensor network for monitoring temperature, humidity, and illumination of a c...
Murat Demirbas, Ken Yian Chow, Chieh Shyan Wan