Sciweavers

17 search results - page 1 / 4
» jhsn 2006
Sort
View
JHSN
2006
66views more  JHSN 2006»
13 years 4 months ago
Anomaly intrusion detection in wireless sensor networks
Vijay Bhuse, Ajay K. Gupta
JHSN
2006
67views more  JHSN 2006»
13 years 4 months ago
SPEE: A Secure Program Execution Environment tool using code integrity checking
Olga Gelbart, Bhagirath Narahari, Rahul Simha
JHSN
2000
86views more  JHSN 2000»
13 years 4 months ago
Alert communication primitives above TCP
We consider communication primitives that can be executed by an application process to exchange messages with another application process over a TCP/IP network. A communication pri...
Mohamed G. Gouda, Tommy M. McGuire
JHSN
2006
100views more  JHSN 2006»
13 years 4 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
JHSN
2000
172views more  JHSN 2000»
13 years 4 months ago
Dynamic token bucket (DTB): a fair bandwidth allocation algorithm for high-speed networks
Fair allocation of available bandwidth to competing flows is a simple form of quality of service (QoS) that can be provided to customers in packet-switched networks. A number of p...
Jayakrishna Kidambi, Dipak Ghosal, Biswanath Mukhe...