Sciweavers

308 search results - page 27 / 62
» Resonance: dynamic access control for enterprise networks
Sort
View
INFOCOM
2008
IEEE
14 years 1 months ago
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach
—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
Edson H. Watanabe, Daniel S. Menasché, Edmu...
SUTC
2008
IEEE
14 years 1 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
BROADNETS
2007
IEEE
14 years 1 months ago
TCP dynamics over IEEE 802.11E WLANs: Modeling and throughput enhancement
— Today, IEEE 802.11 Wireless LAN (WLAN) has become a prevailing solution for broadband wireless Internet access while Transport Control Protocol (TCP) is the dominant transport ...
Jeonggyun Yu, Sunghyun Choi, Daji Qiao
IJWMC
2006
75views more  IJWMC 2006»
13 years 7 months ago
Performance of multichannel wireless ad hoc networks
:ThispaperaddressesthedesignofMediumAccessControl(MAC)protocolsforwireless ad hoc networks that derive benefits from using multiple orthogonal channels for data transmission. Each ...
Asis Nasipuri, Samir Ranjan Das
POLICY
2001
Springer
13 years 12 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...