Sciweavers

339 search results - page 45 / 68
» Network security project management: a security policy-based...
Sort
View
ECUMN
2007
Springer
14 years 28 days ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
ICDCSW
2008
IEEE
14 years 1 months ago
Real-Time Data Services for Cyber Physical Systems
Cyber Physical Systems (CPSs) have grand visions with great socio-economic impacts such as blackout-free electricity supply and real-time disaster recovery. A key challenge is pro...
Kyoung-Don Kang, Sang Hyuk Son
SUTC
2006
IEEE
14 years 23 days ago
Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks
- In this paper, we describe a group key management protocol for hierarchical sensor networks where instead of using pre-deployed keys, each sensor node generates a partial key dyn...
Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bha...
NOMS
2006
IEEE
147views Communications» more  NOMS 2006»
14 years 23 days ago
DiMAPI: An Application Programming Interface for Distributed Network Monitoring
Abstract— Network monitoring and measurement is commonly regarded as an essential function for understanding, managing and improving the performance and security of network infra...
Panos Trimintzios, Michalis Polychronakis, Antonis...
ITCC
2005
IEEE
14 years 10 days ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch