Sciweavers

579 search results - page 86 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
EGC
2005
Springer
14 years 1 months ago
Experiences of Applying Advanced Grid Authorisation Infrastructures
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...
VTC
2006
IEEE
109views Communications» more  VTC 2006»
14 years 1 months ago
Evaluation of a Novel Low Complexity Smart Antenna for Wireless LAN Systems
— A novel smart antenna is described, which is conceived as a low complexity inexpensive upgrade for IEEE 802.11b/g Wireless Local Area Network (WLAN) systems. Using smart antenn...
Timothy J. Harrold, Dean C. Kemp, Mark A. Beach, C...
NSPW
2004
ACM
14 years 1 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
FIDJI
2004
Springer
14 years 1 months ago
Task-Based Access Control for Virtual Organizations
Abstract. GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual o...
Panos Periorellis, Savas Parastatidis
IMC
2009
ACM
14 years 2 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...