Sciweavers

510 search results - page 24 / 102
» Security issues in control, management and routing protocols
Sort
View
ACSAC
1998
IEEE
14 years 4 hour ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
CCR
2006
92views more  CCR 2006»
13 years 7 months ago
Flow labelled IP over ATM: design and rationale
We describe a system in which layer 2 switching is placed directly under the control of layer 3 routing protocols on a hop-by-hop basis. Specifically, ATM switching is controlled ...
Greg Minshall, Robert M. Hinden, Eric Hoffman, Fon...
PDPTA
2003
13 years 9 months ago
Distributed Access Control for Carrier Class Clusters
The telecommunication industry traditionally uses clusters to meet its carrier-class requirements of high availability and reliability. As security has also become a major issue, ...
Makan Pourzandi, Axelle Apvrille, E. Gingras, A. M...
ICDCS
2006
IEEE
14 years 1 months ago
A Locality-Aware Cooperative Cache Management Protocol to Improve Network File System Performance
In a distributed environment the utilization of file buffer caches in different clients may vary greatly. Cooperative caching is used to increase cache utilization by coordinatin...
Song Jiang, Fabrizio Petrini, Xiaoning Ding, Xiaod...
IPPS
2006
IEEE
14 years 1 months ago
k-anycast routing schemes for mobile ad hoc networks
— Anycast is a communication paradigm that was first introduced to the suit of routing protocols in IPv6 networks. In anycast, a packet is intended to be delivered to one of the...
Bing Wu, Jie Wu