Sciweavers

1446 search results - page 171 / 290
» Network Access Control (NAC)
Sort
View
SACMAT
2009
ACM
15 years 10 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...
CORR
2008
Springer
105views Education» more  CORR 2008»
15 years 4 months ago
Integrating OPC Data into GSN Infrastructures
This paper presents the design and the implementation of an interface software component between OLE for Process Control (OPC) formatted data and the Global ...
Olivier Passalacqua, Eric Benoit, Marc-Philippe Hu...
INFOCOM
2008
IEEE
15 years 10 months ago
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach
—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
Edson H. Watanabe, Daniel S. Menasché, Edmu...
QSHINE
2005
IEEE
15 years 9 months ago
Enhancing the IEEE 802.11e in QoS Support: Analysis and Mechanisms
Despite its support of prioritized services, the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) cannot guarantee strict QoS required by real-time services such as voice a...
Xiang Chen, Hongqiang Zhai, Yuguang Fang
CCS
2008
ACM
15 years 6 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis