Sciweavers

979 search results - page 43 / 196
» Developing Dynamic Security Policies
Sort
View
CISS
2008
IEEE
14 years 4 months ago
Secure transmission power of cognitive radios for dynamic spectrum access applications
—One of the major concerns of cognitive radios when used for secondary spectrum access is the potential of interfering primary users, considering especially that cognitive radios...
Xiaohua Li, Jinying Chen, Fan Ng
PET
2009
Springer
14 years 2 months ago
Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design
This research analyzes consumer privacy issues pertaining to the newly developing wireless marketing context, specifically, wireless advertising messaging (WAM). We develop a conce...
Heng Xu, John W. Bagby, Terence Ryan Melonas
EUROMICRO
2003
IEEE
14 years 3 months ago
Enforcing a lips Usage Policy for CORBA Components
Software components promise easy reuse, dependability, and simplified development. Problems arise when implicit assumptions about the use of the component are encoded in the imple...
Wayne DePrince Jr., Christine Hofmeister
ENTCS
2007
199views more  ENTCS 2007»
13 years 10 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
MIDDLEWARE
2007
Springer
14 years 4 months ago
A Policy Management Framework for Content-Based Publish/Subscribe Middleware
Abstract. Content-based Publish/Subscribe (CPS) is a powerful paradigm providing loosely-coupled, event-driven messaging services. Although the general CPS model is well-known, man...
Alex Wun, Hans-Arno Jacobsen