Sciweavers

72 search results - page 12 / 15
» Towards a Mechanism for Discretionary Overriding of Access C...
Sort
View
DGO
2009
175views Education» more  DGO 2009»
13 years 8 months ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...
GLOBECOM
2009
IEEE
14 years 2 months ago
Building Femtocell More Secure with Improved Proxy Signature
—Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP define new architecture and security requirement f...
Chan-Kyu Han, Hyoung-Kee Choi, In-Hwan Kim
IEEEIAS
2008
IEEE
14 years 2 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina
PIMRC
2010
IEEE
13 years 5 months ago
Automatically configured, optimised and QoS aware wireless mesh networks
Wireless mesh networks (WMNs) are comprised of nodes with multiple radio interfaces and provide broadband residential internet access or connectivity to temporal events. Our goal i...
Elias Z. Tragos, Raffaele Bruno, Emilio Ancillotti...
SENSYS
2004
ACM
14 years 29 days ago
Mitigating congestion in wireless sensor networks
Network congestion occurs when offered traffic load exceeds available capacity at any point in a network. In wireless sensor networks, congestion causes overall channel quality t...
Bret Hull, Kyle Jamieson, Hari Balakrishnan