Sciweavers

362 search results - page 23 / 73
» Security Issues in Policy Routing
Sort
View
APNOMS
2006
Springer
13 years 11 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
COMCOM
2004
127views more  COMCOM 2004»
13 years 7 months ago
Traffic splitting in a network: split traffic models and applications
The contemporary high-speed networks, e.g. the Internet and asynchronous transfer mode (ATM) networks provide a convenient and cost-effective communication platform to carry the e...
Huei-Wen Ferng, Cheng-Ching Peng
SOUPS
2005
ACM
14 years 1 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
ISSA
2008
13 years 9 months ago
Emerging Framework for The Evaluation of Open Source Security Tools
The drive from the South African Government towards the adoption of open source software across all platforms, incurred a number of research and development questions. The open so...
Elmarie Biermann, Jan Mentz
CSFW
2010
IEEE
13 years 11 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma