Sciweavers

282 search results - page 11 / 57
» Private Policy Negotiation
Sort
View
IAT
2008
IEEE
14 years 1 months ago
Negotiation in Semi-cooperative Agreement Problems
In this paper we introduce the Semi-Cooperative Extended Incremental Multiagent Agreement Problem with Preferences (SC-EIMAPP). In SC-EIMAPPs, variables arise over time. For each ...
Elisabeth Crawford, Manuela M. Veloso
ESORICS
2011
Springer
12 years 7 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
ESORICS
2007
Springer
14 years 1 months ago
Change-Impact Analysis of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Alex X. Liu
DFN
2003
13 years 8 months ago
Virtual Private Networks Coping with Complexity
: Large-scale deployment of virtual private networks with hundreds or thousands of clients means a constant battle with complexity that can only be won by setting up powerful authe...
Andreas Steffen
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
13 years 11 months ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...