Sciweavers

38 search results - page 6 / 8
» Reflections on aspects and configurable protocols
Sort
View
POLICY
2001
Springer
14 years 4 days ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
ISESE
2005
IEEE
14 years 1 months ago
Empirical study design in the area of high-performance computing (HPC)
The development of High-Performance Computing (HPC) programs is crucial to progress in many fields of scientific endeavor. We have run initial studies of the productivity of HPC d...
Forrest Shull, Jeffrey Carver, Lorin Hochstein, Vi...
ISSA
2008
13 years 9 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
IFIPTM
2009
163views Management» more  IFIPTM 2009»
13 years 5 months ago
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. Thes...
Adam J. Lee, Marianne Winslett, Kenneth J. Perano
ADHOCNOW
2009
Springer
13 years 8 months ago
An Efficient and Scalable Address Autoconfiguration in Mobile Ad Hoc Networks
Several protocols of address autoconfiguration in the mobile ad hoc network (MANET) are present in the current literature. Although some of these protocols perform decently in spar...
Syed Rafiul Hussain, Subrata Saha, Ashikur Rahman