Sciweavers

299 search results - page 44 / 60
» Managing Access Control for Presence-Based Services
Sort
View
MONET
2006
145views more  MONET 2006»
13 years 8 months ago
Efficient Resource Allocation for Policy-Based Wireless/Wireline Interworking
Abstract This paper proposes efficient resource allocation techniques for a policy-based wireless/wireline interworking architecture, where quality of service (QoS) provisioning an...
Yu Cheng, Wei Song, Weihua Zhuang, Alberto Leon-Ga...
WPES
2003
ACM
14 years 1 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
JCP
2007
154views more  JCP 2007»
13 years 8 months ago
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures
—The computational Grid concept is gaining great popularity as the best way to deliver access to a wide range of distributed computing and data resources. But, as Grids move from...
Francesco Palmieri
COMCOM
2006
77views more  COMCOM 2006»
13 years 8 months ago
SIP as a unified signalling solution in a beyond 3G system
The adoption of packet-switched technologies in mobile communication systems has enabled the provision of IPbased services to mobile users. Yet, these systems, such as the UMTS net...
Vaggelis Nikas, Georgios V. Lioudakis, Nikolaos L....
IEEEARES
2008
IEEE
14 years 2 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul