For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
In ubiquitous networks, a lot of sensors and RFID readers will be connected to the networks as well as PCs and mobile phones are connected, and huge numbers of transactions are exp...
Recent years have seen an increasing interest in end-to-end available bandwidth estimation. A number of estimation techniques and tools have been developed during the last few year...
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
In convergence telecommunication environment, Business Agility plays very important role in the OSS(Operation Support System) when telco provide new merged services to customer on ...
Young-Wook Woo, Daniel W. Hong, Seong-Il Kim, Byun...
We have previously proposed a diffusion-type flow control mechanism as a solution for severely time-sensitive flow control required for high-speed networks. In this mechanism, each...
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Abstract. In Grid service, resource management is important to support capability for good quality and efficiency for the computing and storage service. In order to provide this re...
As the network technology has been developed, the Next Generation Internet (NGI) such as Internet2, KOREN, KREONET2 and etc has been deployed to support bandwidth of Giga bps. And,...
This paper proposes a DiffServ-over-MPLS Traffic Engineering (TE) architecture and describes the implementation of its functional blocks on Intel IXP2400 Network Processor using In...