Sciweavers

1446 search results - page 176 / 290
» Network Access Control (NAC)
Sort
View
SIGOPSE
2004
ACM
15 years 9 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
15 years 5 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung
COMCOM
2002
143views more  COMCOM 2002»
15 years 4 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
MOBISYS
2008
ACM
16 years 3 months ago
Supporting vehicular mobility in urban multi-hop wireless networks
Deployments of city-wide multi-hop 802.11 networks introduce challenges for maintaining client performance at vehicular speeds. We experimentally demonstrate that current network ...
Anastasios Giannoulis, Marco Fiore, Edward W. Knig...
ICPADS
2008
IEEE
15 years 10 months ago
An Efficient Policy System for Body Sensor Networks
Body sensor networks (BSNs) have become a promising technology for healthcare, in which biosensors continuously monitor physiological parameters of a user. Distinct from conventio...
Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lu...