Sciweavers

5511 search results - page 972 / 1103
» Security for Network Places
Sort
View
CSREASAM
2004
13 years 10 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
CSREASAM
2006
13 years 10 months ago
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
Amit Mathur, Suneuy Kim, Mark Stamp
IADIS
2004
13 years 10 months ago
The efficient communications for VPN access of mobile nodes over mobile IPV6
Mobile IPv6 is thought to be dominant protocol for providing mobility. In the near future, most portable communication devices will deploy Mobile IPv6 mechanism. Our main concerns...
Hyungkyu Lee, Jaehoon Nah, Kyoil Jung
ECIS
2001
13 years 10 months ago
The Impact of Social Issues on Internet Policy Making
The advantages that Internet as a new technology offers to business and individuals can't be fully exploited without taking under consideration a number of social issues that...
Anastasia Papazafeiropoulou, Athanasia Pouloudi
IADIS
2003
13 years 10 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...