Sciweavers

1737 search results - page 47 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
SACMAT
2010
ACM
14 years 1 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
OOPSLA
2005
Springer
14 years 2 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
ICMCS
2007
IEEE
106views Multimedia» more  ICMCS 2007»
14 years 3 months ago
An Investigation and a Preventing Strategy for the Redundant Packets in P2P Networks with Push Method
The push method for data transmission in peer-to-peer system has drawn great interest, since it can efficiently reduce the accumulated latency observed at user nodes. However, it ...
Xin Xiao, Yuanchun Shi, Meng Zhang
CORR
2011
Springer
164views Education» more  CORR 2011»
13 years 19 days ago
Online Strategies for Intra and Inter Provider Service Migration in Virtual Networks
Network virtualization allows one to build dynamic distributed systems in which resources can be dynamically allocated at locations where they are most useful. In order to fully e...
Dushyant Arora, Marcin Bienkowski, Anja Feldmann, ...

Publication
261views
15 years 7 months ago
Improving Explicit Congestion Notification with the Mark-Front Strategy
Delivering congestion signals is essential to the performance of networks. Current TCP/IP networks use packet losses to signal congestion. Packet losses not only reduces TCP perfor...
Chunlei Liu, Raj Jain,