Sciweavers

1000 search results - page 69 / 200
» Application Access Control at Network Level
Sort
View
IADIS
2004
13 years 9 months ago
A quality of service aware Web server
This paper addresses two questions. Firstly, how is it possible for an application to become aware of network conditions and secondly, given this awareness, how can a system be de...
Kristoffer Getchell, Martin Bateman, Colin Allison...
CDC
2009
IEEE
119views Control Systems» more  CDC 2009»
14 years 11 days ago
Resource sharing optimality in WiFi infrastructure networks
Abstract— In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this...
Laura Giarré, Giovanni Neglia, Ilenia Tinni...
PLDI
2009
ACM
14 years 2 months ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...
CSREASAM
2009
13 years 8 months ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov
LISA
2008
13 years 10 months ago
Portable Desktop Applications Based on P2P Transportation and Virtualization
Play-on-demand is usually regarded as a feasible access mode for web content (including streaming video, web pages and so on), web services and some Software-As-A-Service (SaaS) a...
Youhui Zhang, Xiaoling Wang, Liang Hong