Sciweavers

595 search results - page 25 / 119
» New architecture for intra-domain network security issues
Sort
View
IADIS
2003
13 years 10 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...
EUROMICRO
2004
IEEE
14 years 11 days ago
Securing Ad hoc Routing Protocols
Ad hoc networks are subject of many recent research efforts. Especially in mobile scenarios, self-organizing networks are of high interest. While the routing aspects of mobile ad ...
Frank Kargl, Stefan Schlott, Andreas Klenk, Alfred...
CCS
2009
ACM
14 years 3 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
MUE
2008
IEEE
121views Multimedia» more  MUE 2008»
14 years 3 months ago
Investigation of Secure Framework for Multipath MANET
A wireless multihop ad hoc network is emerging as an important area for new developments in the ubiquitous network. Although ad hoc network is attractive solution, there are still...
Binod Vaidya, Dong-You Choi, Jong-An Park, Seung J...
ADBIS
2010
Springer
136views Database» more  ADBIS 2010»
13 years 10 months ago
New Frontiers in Business Intelligence: Distribution and Personalization
Abstract. To meet the new, more sophisticated needs of decision makers, a new generation of BI systems is emerging. In this paper we focus on two enabling technologies for this new...
Stefano Rizzi