Sciweavers

212 search results - page 25 / 43
» CloudPolice: taking access control out of the network
Sort
View
ICC
2007
IEEE
14 years 26 days ago
Towards an Integrated Design Approach to Specknets
The Research Consortium in Speckled Computing is a multidisciplinary grouping of computer scientists, electronic engineers, physicists and electrochemists with the aim of realising...
D. K. Arvind, K. Elgaid, T. Krauss, A. Paterson, R...
NDSS
2006
IEEE
14 years 3 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
INFOCOM
2007
IEEE
14 years 3 months ago
Bandwidth Balancing in Multi-Channel IEEE 802.16 Wireless Mesh Networks
Abstract— In wireless mesh networks, the end-to-end throughput of traffic flows depends on the path length, i.e. the higher the number of hops, the lower becomes the throughput...
Claudio Cicconetti, Ian F. Akyildiz, Luciano Lenzi...
TWC
2008
154views more  TWC 2008»
13 years 9 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
CCECE
2009
IEEE
13 years 6 months ago
The Australian Coastal Ocean radar Network facility
The Australian Coastal Ocean radar Network (ACORN) is a monitoring network of HF radars which are being installed around Australia under a National Collaborative Research Infrastr...
Malcolm L. Heron