Sciweavers

804 search results - page 77 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
CASCON
1996
154views Education» more  CASCON 1996»
15 years 6 months ago
Broadband application transport service and management
Multimedia applications using broadband networking technologies (for example, Asynchronous Transfer Mode) often require services not provided by standard transport layer middlewar...
Zhenjun Zhu, Gerald A. Winters, Patrick Martin, Hu...
CCS
2006
ACM
15 years 8 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
152
Voted
WIOPT
2006
IEEE
15 years 10 months ago
On the macroscopic effects of local interactions in multi-hop wireless networks
Abstract— The objective of the paper is to provide qualitative insight into the global effects of distributed mechanisms, such as carrier sense multiple access (CSMA) and rate co...
Venkatesh Saligrama, David Starobinski
117
Voted
ICN
2009
Springer
15 years 11 months ago
Acquisition of Channel State Information for Routing Purposes in Relay-Based WiMAX Networks
— The paper focuses on multi-hop routing mechanism used in relay based WiMAX networks. The proposal how to acquire channel state information (CSI) on relay and access path for de...
Pavel Mach, Zdenek Becvar, Robert Bestak
142
Voted
WPES
2003
ACM
15 years 10 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...