Sciweavers

1357 search results - page 232 / 272
» Controlling Access to Documents: A Formal Access Control Mod...
Sort
View
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 3 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
PIMRC
2008
IEEE
14 years 3 months ago
Performance analysis of cooperative communications from MAC layer perspectives
—In recent years, cooperative communication has been proposed as a new communication paradigm that incorporates a relay node to assist the direct point-to-point transmission. By ...
Chun-Chieh Liao, Yu-Pin Hsu, Kai-Ten Feng
GLOBECOM
2007
IEEE
14 years 3 months ago
Utilizing Semantic Tags for Policy Based Networking
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 3 months ago
Quantifying the Interference Gray Zone in Wireless Networks: A Measurement Study
—In wireless networks where communications are made over a shared medium, interference and collisions are the primary causes of packet drops. In multi-hop networks such as wirele...
Wonho Kim, Jeongkeun Lee, Taekyoung Kwon, Sung-Ju ...
ACMSE
2006
ACM
14 years 2 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta