As wireless networks become more widely used, there is a growing need to support advanced services, such as multimedia streaming and voice over IP. Traditional approaches to guara...
Ian D. Chakeres, Elizabeth M. Belding-Royer, Josep...
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
Abstract— Admission control algorithms used in access networks for multiplexed voice sources are typically based on aggregated system characteristics, such as aggregate loss prob...
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...