Sciweavers

172 search results - page 26 / 35
» Secure and Manageable Virtual Private Networks for End-users
Sort
View
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 3 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
ESORICS
2009
Springer
14 years 3 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
TGC
2007
Springer
14 years 2 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou
BROADNETS
2006
IEEE
14 years 2 months ago
Intra and Interdomain Circuit Provisioning Using the OSCARS Reservation System
— With the advent of service sensitive applications such as remote controlled experiments, time constrained massive data transfers, and video-conferencing, it has become apparent...
Chin Guok, David W. Robertson, Mary R. Thompson, J...
TON
2008
160views more  TON 2008»
13 years 8 months ago
Label space reduction in MPLS networks: how much can a single stacked label do?
Most network operators have considered reducing LSR label spaces (number of labels used) as a way of simplifying management of underlaying Virtual Private Networks (VPNs) and there...
Fernando Solano, Thomas Stidsen, Ramón Fabr...