Sciweavers

2560 search results - page 43 / 512
» Securing VO Management
Sort
View
156
Voted
EUROSYS
2008
ACM
15 years 11 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
JNSM
2007
97views more  JNSM 2007»
15 years 2 months ago
Policy-based Management: A Historical Perspective
This paper traces the history of policy-based management and how it evolved from the first security models dating back to the late 1960’s until today’s more elaborate framewo...
Raouf Boutaba, Issam Aib
111
Voted
MOBIMEDIA
2007
15 years 4 months ago
Experimental evaluation of community-based WLAN voice and data services
The purpose of this work is to experimentally evaluate the quality of voice and data services over community-based WLAN access networks. We use P2PWNC, the Wireless LAN roaming ar...
Pantelis A. Frangoudis, Vasileios P. Kemerlis, Dim...
150
Voted
CORR
2011
Springer
189views Education» more  CORR 2011»
14 years 9 months ago
Secure Routing in Wireless Mesh Networks
— This paper introduces Policy based Management Information Base to mange danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management fun...
Jaydip Sen
105
Voted
ISSA
2008
15 years 4 months ago
Spam Over Internet Telephony and How to Deal with it
In our modern society telephony has developed to an omnipresent service. People are available at anytime and anywhere. Furthermore the Internet has emerged to an important communi...
Rachid El Khayari, Nicolai Kuntze, Andreas U. Schm...