Sciweavers

427 search results - page 19 / 86
» Policies: Giving Users Control over Calls
Sort
View
ICDE
2006
IEEE
113views Database» more  ICDE 2006»
14 years 3 months ago
PRINDA: Architecture and Design of Non-Disclosure Agreements in Privacy Policy Framework
Non Disclosure Agreements(NDAs) in real life are typically used whenever there is transfer of private or confidential information from one organization to another. The provider o...
Vikram Goyal, Shyam K. Gupta, Indira Meshram, Anan...
INFOCOM
2000
IEEE
14 years 2 months ago
Differentiated Admission Control in Large Networks
Abstract—This paper proposes a simple but effective admission control algorithm for integrated services packet networks. The admission control scheme, based on stochastic control...
Cedric Adjih, Philippe Jacquet, Philippe Robert
ACSAC
2009
IEEE
14 years 1 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
WCNC
2010
IEEE
14 years 1 months ago
Dynamic Control of Data Ferries under Partial Observations
—Controlled mobile helper nodes called data ferries have recently been proposed to bridge communications between disconnected nodes in a delay-tolerant manner. While existing wor...
Chi Harold Liu, Ting He, Kang-won Lee, Kin K. Leun...
FOSSACS
2004
Springer
14 years 3 months ago
Reasoning about Dynamic Policies
People often need to reason about policy changes before they are adopted. For example, suppose a website manager knows that users want to enter her site without going through the w...
Riccardo Pucella, Vicky Weissman