This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
As a consequence of the current trend towards consolidating computing, storage and networking infrastructures into large centralized data centers, applications compete for shared ...
Sandeep Uttamchandani, Guillermo A. Alvarez, Gul A...
This work proposes a XML-based framework for distributing and enforcing RSVP access control policies, for RSVP-aware application servers. Policies are represented by extending XAC...
Dissemination control (DCON) is emerging as one of the most important and challenging goals for information security. DCON is concerned with controlling information and digital ob...
We develop a framework for specifying and reasoning about policies for sharing resources in coalitions, focussing here on a particular, common type of contract in which coalition ...
Babak Sadighi Firozabadi, Marek J. Sergot, Anna Ci...
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over w...
Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Cho-Yu Ja...
We present a policy-based approach to managing congestions in Short Message Service (SMS) systems. Congestion situations typically occur on SMS Gateways (SMSGs), which route SMS m...
Alberto Gonzalez Prieto, Roberto Cosenza, Rolf Sta...