Sciweavers

2560 search results - page 8 / 512
» Securing VO Management
Sort
View
POLICY
2005
Springer
14 years 4 months ago
A Model for Usage Policy-Based Resource Allocation in Grids
Challenging usage policy issues can arise within virtual organizations (VOs) that integrate participants and resources spanning multiple physical institutions. Participants may wi...
Catalin Dumitrescu, Michael Wilde, Ian T. Foster
ICCCN
2007
IEEE
14 years 5 months ago
Evaluation of Security Protocols for the Session Initiation Protocol
— Despite the popularity of VoIP these days, this method of communication may present significant security challenges in terms of privacy and accounting. Authentication and messa...
Eun-Chul Cha, Hyoung-Kee Choi, Sung-Jae Cho
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
14 years 4 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
CORR
2006
Springer
115views Education» more  CORR 2006»
13 years 11 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
IJNSEC
2007
253views more  IJNSEC 2007»
13 years 10 months ago
Stream or Block Cipher for Securing VoIP?
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Ashraf D. Elbayoumy, Simon J. Shepherd