Sciweavers

514 search results - page 87 / 103
» Controlling across complex networks - Emerging links between...
Sort
View
POLICY
2001
Springer
13 years 12 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
PDPTA
2004
13 years 9 months ago
Towards an Adaptive Economic Society of Peers
This paper presents our on-going research into selforganizing and self-healing networks of resource brokers, for use in complex Peer-to-Peer (P2P) resource sharing and Grid comput...
Paul Silvey
IMC
2010
ACM
13 years 5 months ago
Eyeball ASes: from geography to connectivity
This paper presents a new approach to determine the geographical footprint of individual Autonomous Systems that directly provide service to end-users, i.e.,eyeball ASes. The key ...
Amir H. Rasti, Nazanin Magharei, Reza Rejaie, Walt...
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
13 years 11 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
INFOCOM
2007
IEEE
14 years 1 months ago
VoIP on Wireless Meshes: Models, Algorithms and Evaluation
—We study the problem of supporting VoIP calls in a wireless mesh network. Specifically, we propose solutions for call admission control (CAC) and route selection for VoIP calls...
Anand Kashyap, Samrat Ganguly, Samir R. Das, Suman...