Sciweavers

13553 search results - page 2460 / 2711
» A Generalized Multi-View Approach
Sort
View
SACMAT
2009
ACM
15 years 10 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
SIGCOMM
2009
ACM
15 years 10 months ago
Why should we integrate services, servers, and networking in a data center?
Since the early days of networks, a basic principle has been that endpoints treat the network as a black box. An endpoint injects a packet with a destination address and the netwo...
Paolo Costa, Thomas Zahn, Antony I. T. Rowstron, G...
SIGCOMM
2009
ACM
15 years 10 months ago
Hash, don't cache: fast packet forwarding for enterprise edge routers
As forwarding tables and link speeds continue to grow, fast packet forwarding becomes increasingly challenging for enterprise edge routers. Simply building routers with ever large...
Minlan Yu, Jennifer Rexford
SIGCOMM
2009
ACM
15 years 10 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
SIGCOMM
2009
ACM
15 years 10 months ago
MobiClique: middleware for mobile social networking
We consider a mobile ad hoc network setting where Bluetooth enabled mobile devices communicate directly with other devices as they meet opportunistically. We design and implement ...
Anna Kaisa Pietiläinen, Earl Oliver, Jason Le...
« Prev « First page 2460 / 2711 Last » Next »