Sciweavers

4323 search results - page 821 / 865
» On the Security of 3GPP Networks
Sort
View
ISCC
2005
IEEE
14 years 2 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
ISM
2005
IEEE
109views Multimedia» more  ISM 2005»
14 years 2 months ago
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but cooperating mobile devices where trust relationships between entities are uncertai...
Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajja...
ISM
2005
IEEE
84views Multimedia» more  ISM 2005»
14 years 2 months ago
The Protection of QoS for Multimedia Transmission against Denial of Service Attacks
In this paper, a secure and adaptive multimedia transmission framework is proposed to maintain the quality of service (QoS) of the multimedia streams during the Denial-of-Service ...
Hongli Luo, Mei-Ling Shyu
ISSRE
2005
IEEE
14 years 2 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
ITCC
2005
IEEE
14 years 2 months ago
A Toolkit for Automatically Constructing Outdoor Radio Maps
Outdoor location systems based on Wireless Access Point (WAP) signal strength must either know the exact location of the WAPs in order to use a triangulation algorithm, or must co...
Kay Connelly, Yong Liu, Dan Bulwinkle, Adam Miller...