Sciweavers

128 search results - page 13 / 26
» Transparent Network Security Policy Enforcement
Sort
View
IJAHUC
2011
143views more  IJAHUC 2011»
13 years 6 days ago
A mobility framework to improve heterogeneous wireless network services
: We propose and investigate the Internet Protocol version 6 (IPv6) enabled mobility framework to improve the user mobility experience in heterogenous wireless networks. The framew...
Chong Shen, Wencai Du, Robert Atkinson, James Irvi...
ACSAC
1997
IEEE
14 years 1 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
AINA
2010
IEEE
14 years 1 months ago
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each oth...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...
USS
2008
13 years 11 months ago
Selective Versioning in a Secure Disk System
Making vital disk data recoverable even in the event of OS compromises has become a necessity, in view of the increased prevalence of OS vulnerability exploits over the recent yea...
Swaminathan Sundararaman, Gopalan Sivathanu, Erez ...
JCM
2008
75views more  JCM 2008»
13 years 8 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail