Sciweavers

Share
JHSN
2006
85views more  JHSN 2006»
9 years 11 months ago
A scalable intra-domain resource management architecture for DiffServ networks
With the rapid growth of the Internet into a global communication and commercial infrastructure, the need for Quality of Services (QoS) in the Internet becomes more and more import...
Haci A. Mantar, Ibrahim T. Okumus, Junseok Hwang, ...
JHSN
2006
267views more  JHSN 2006»
9 years 11 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
JHSN
2006
95views more  JHSN 2006»
9 years 11 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
JHSN
2006
96views more  JHSN 2006»
9 years 11 months ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...
JHSN
2006
67views more  JHSN 2006»
9 years 11 months ago
SPEE: A Secure Program Execution Environment tool using code integrity checking
Olga Gelbart, Bhagirath Narahari, Rahul Simha
JHSN
2006
66views more  JHSN 2006»
9 years 11 months ago
Anomaly intrusion detection in wireless sensor networks
Vijay Bhuse, Ajay K. Gupta
JHSN
2006
100views more  JHSN 2006»
9 years 11 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
books