Sciweavers

2024 search results - page 316 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
DMSN
2004
ACM
15 years 10 months ago
Active rules for sensor databases
Recent years have witnessed a rapidly growing interest in query processing in sensor and actuator networks. This is mainly due to the increased awareness of query processing as th...
Michael Zoumboulakis, George Roussos, Alexandra Po...
HOTNETS
2010
14 years 11 months ago
HTTP as the narrow waist of the future internet
Over the past decade a variety of network architectures have been proposed to address IP's limitations in terms of flexible forwarding, security, and data distribution. Meanw...
Lucian Popa 0002, Ali Ghodsi, Ion Stoica
SACMAT
2003
ACM
15 years 10 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
CCS
2008
ACM
15 years 6 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
PPNA
2008
150views more  PPNA 2008»
15 years 4 months ago
A survey on peer-to-peer video streaming systems
Abstract Video-over-IP applications have recently attracted a large number of users on the Internet. Traditional client-server based video streaming solutions incur expensive bandw...
Yong Liu, Yang Guo, Chao Liang