Sciweavers

17 search results - page 3 / 4
» jhsn 2006
Sort
View
JHSN
2006
95views more  JHSN 2006»
13 years 5 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
JHSN
2006
267views more  JHSN 2006»
13 years 5 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
JHSN
2006
96views more  JHSN 2006»
13 years 5 months ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...
JHSN
2006
85views more  JHSN 2006»
13 years 5 months ago
A scalable intra-domain resource management architecture for DiffServ networks
With the rapid growth of the Internet into a global communication and commercial infrastructure, the need for Quality of Services (QoS) in the Internet becomes more and more import...
Haci A. Mantar, Ibrahim T. Okumus, Junseok Hwang, ...
JHSN
2000
92views more  JHSN 2000»
13 years 5 months ago
On a class of time varying shapers with application to the renegotiable variable bit rate service
A shaper is a system that stores incoming bits in a bu er and delivers them as early as possible, while forcing the output to be constrained with a given arrival curve. A shaper i...
Silvia Giordano