Consider a setting in which a group of nodes, situated in a large underlying network, wishes to reserve bandwidth on which to support communication. Virtual private networks (VPNs...
Anupam Gupta, Jon M. Kleinberg, Amit Kumar, Rajeev...
Security mechanisms such as firewalls commonly deployed throughout the Internet present serious obstacles to basic usage of Mobile IP. In this paper we describe how IP security me...
Reinhard Ruppelt, Andrei Pelinescu, Cristian Const...
This paper presents personal networks, which integrate a VPN and the per-VPN execution environments of the hosts included in the VPN. The key point is that each execution environm...
Kenichi Kourai, Toshio Hirotsu, Koji Sato, Osamu A...
Emerging Grid applications desire not only high bandwidth but also the ability to control the topology and traffic engineering of the underlying networks, through web service inte...
Hanxi Zhang, Michel Savoie, Scott Campbell, Sergi ...
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...