Sciweavers

1801 search results - page 223 / 361
» Implementation-Oriented Secure Architectures
Sort
View
144
Voted
CCS
2008
ACM
15 years 6 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
SEC
2008
15 years 5 months ago
Negotiation of Prohibition: An Approach Based on Policy Rewriting
Abstract. In recent security architectures, it is possible that the security policy is not evaluated in a centralized way but requires negotiation between the subject who is reques...
Nora Cuppens-Boulahia, Frédéric Cupp...
MOBIMEDIA
2007
15 years 5 months ago
Experimental evaluation of community-based WLAN voice and data services
The purpose of this work is to experimentally evaluate the quality of voice and data services over community-based WLAN access networks. We use P2PWNC, the Wireless LAN roaming ar...
Pantelis A. Frangoudis, Vasileios P. Kemerlis, Dim...
ICWS
2003
IEEE
15 years 5 months ago
Access Control in Dynamic XML-Based Web-Services with X-RBAC
Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
130
Voted
USITS
2003
15 years 5 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen