Sciweavers

WETICE
2008
IEEE
14 years 6 months ago
Towards Making WSRF Based Web Services Strongly Mobile
: Grid Services became a widely used technology for building service oriented applications. The Web Service Resource Framework (WSRF) is the current standard used for building such...
Soumaya Marzouk, Mohamed Jmaiel
WETICE
2008
IEEE
14 years 6 months ago
Integrating Overlay and Social Networks for Seamless P2P Networking
In this paper we introduce Social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, s...
Renato J. O. Figueiredo, P. Oscar Boykin, Pierre S...
WETICE
2008
IEEE
14 years 6 months ago
On the Modeling of Bell-LaPadula Security Policies Using RBAC
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely acce...
Gansen Zhao, David W. Chadwick
NTMS
2008
IEEE
14 years 6 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
NTMS
2008
IEEE
14 years 6 months ago
Architecture for Consuming Long-Lived Mobile Web Services over Multiple Transport Protocols
—The concept of Mobile Web Services (Mob-WS) is catching pace within research communities due to rapid classification of mobile devices enabling pervasive environments. A Web Se...
Fahad Aijaz, Seyed Mohammad Adeli, Bernhard Walke
NTMS
2008
IEEE
14 years 6 months ago
An RF Channel Emulator-Based Testbed for Cooperative Transmission Using Wireless Sensor Devices
—In this paper, the issues and methods regarding setting up the testbed for measuring the performance of cooperative transmission is introduced. Also, some experiments on both th...
Jin-Woo Jung, Mary Ann Ingram
NTMS
2008
IEEE
14 years 6 months ago
Offline Approach to Modeling and Optimization of Flows in Peer-to-Peer Systems
—Peer-to-Peer (P2P) systems gain much attention in recent years. According to many statistics, P2P systems contribute a significant portion of the Internet traffic. Individual In...
Krzysztof Walkowiak
NTMS
2008
IEEE
14 years 6 months ago
Biometric Identification System Based on Electrocardiogram Data
Y. Gahi, M. Lamrani, Abdelhak Zoglat, Mouhcine Gue...
NTMS
2008
IEEE
14 years 6 months ago
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches
Wireless Sensor Networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securi...
Hani Alzaid, Manal Alfaraj