Sciweavers

979 search results - page 145 / 196
» Developing Dynamic Security Policies
Sort
View
IWAN
2000
Springer
14 years 1 months ago
Active Networking Means Evolution (or Enhanced Extensibility Required)
The primary goal of active networking is to increase the pace of network evolution. The approach to achieving this goal, as well as the goal of enhancing customizability, is to al...
Michael W. Hicks, Scott Nettles
TSP
2010
13 years 4 months ago
Sequential and cooperative sensing for multi-channel cognitive radios
Effective spectrum sensing is a critical prerequisite for multi-channel cognitive radio (CR) networks, where multiple spectrum bands are sensed to identify transmission opportuniti...
Seung-Jun Kim, Georgios B. Giannakis
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 4 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
SACMAT
2006
ACM
14 years 3 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
DGO
2007
168views Education» more  DGO 2007»
13 years 11 months ago
A distributed event-triggered knowledge sharing system
Government agencies globally are facing problems such as illegal immigration, terrorism, and disease diagnosis and control. Solutions to these problems rely heavily on collaborati...
Seema Degwekar, Jeff DePree, Stanley Y. W. Su, How...