Sciweavers

534 search results - page 61 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
WINE
2005
Springer
155views Economy» more  WINE 2005»
14 years 26 days ago
Economic Analysis of Networking Technologies for Rural Developing Regions
Abstract. Providing network connectivity to rural regions in the developing world is an economically challenging problem especially given the low income levels and low population d...
Shridhar Mubaraq Mishra, John Hwang, Dick Filippin...
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 4 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
IWDC
2004
Springer
510views Communications» more  IWDC 2004»
14 years 23 days ago
On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks
Abstract. The extension of Internet services to public transport passengers is slowly becoming inevitable. To this end, it is envisaged that high-speed local area networks will be ...
Muhammad Ali Malik, Salil S. Kanhere, Mahbub Hassa...
DSOM
2006
Springer
13 years 9 months ago
A WSDM-Based Architecture for Global Usage Characterization of Grid Computing Infrastructures
Current solutions to characterize grid computing usage are limited in three important aspects. First, they do not provide a global, uniform view of the use of infrastructures compr...
Glauco Antonio Ludwig, Luciano Paschoal Gaspary, G...
IRI
2006
IEEE
14 years 1 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss