Sciweavers

2207 search results - page 58 / 442
» Security at the Internet Layer
Sort
View
DRM
2008
Springer
15 years 5 months ago
A four-layer model for security of digital rights management
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This co...
Eric Diehl
ACSAC
2000
IEEE
15 years 8 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
NETWORKING
2000
15 years 5 months ago
Network-Driven Layered Multicast with IPv6
Receiver-driven Layered Multicast (RLM) has previously been proposed to distribute video over the best-effort heterogeneous IP networks. Although RLM can avoid network overloading ...
Ho-pong Sze, Soung C. Liew
TMC
2010
137views more  TMC 2010»
14 years 10 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
AH
2006
Springer
15 years 10 months ago
GLAM: A Generic Layered Adaptation Model for Adaptive Hypermedia Systems
This paper introduces GLAM, a system based on situation calculus and meta-rules, which is able to provide adaptation by means of selection of actions. It is primarily designed to p...
Cédric Jacquiot, Yolaine Bourda, Fabrice Po...