Sciweavers

101 search results - page 14 / 21
» Use of Peer-To-Peer technology in Internet access networks a...
Sort
View
POLICY
2004
Springer
14 years 1 months ago
A Decentralized Treatment of a Highly Distributed Chinese-Wall Policy
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Naftaly H. Minsky
IMC
2009
ACM
14 years 3 months ago
TCP revisited: a fresh look at TCP in the wild
Since the last in-depth studies of measured TCP traffic some 68 years ago, the Internet has experienced significant changes, including the rapid deployment of backbone links wit...
Feng Qian, Alexandre Gerber, Zhuoqing Morley Mao, ...
IADIS
2004
13 years 10 months ago
Towards interoperability of wireless services - a description model of service interfaces
Web services are evolving quickly in terms of standardization. Technology and wireless networks exact requirements upon web services used via wireless connections, such as mobile ...
Anne Immonen, Jarkko Holappa, Päivi Kallio, J...
COMCOM
2008
104views more  COMCOM 2008»
13 years 8 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
PADS
2009
ACM
14 years 3 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu