Sciweavers

1587 search results - page 166 / 318
» Access Control for Shared Resources
Sort
View
95
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks
—Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over multihop wireless networks. Despite these advances, however, no ...
Jingpu Shi, Omer Gurewitz, Vincenzo Mancuso, Josep...
118
Voted
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 7 months ago
Buffer Occupancy-Based CAC in Converged IP and Broadcasting Networks
— This paper introduces a buffer occupancy -based admission control mechanism aimed to counter link congestion while fairly sharing the bandwidth in converged IP and broadcasting...
Yassine Hadjadj Aoul, Abdelhamid Nafaa, Ahmed Meha...
101
Voted
WPES
2003
ACM
15 years 6 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
104
Voted
IADIS
2004
15 years 2 months ago
Enhancing educational metadata with digital rights information: the EMDIR web-based environment
Taking into account the constantly increasing number of educational resources available on the Web, the problem arising is to determine who is authorized to access these resources...
Symeon Chatzinotas, Pythagoras Karampiperis, Demet...
91
Voted
IANDC
2008
140views more  IANDC 2008»
15 years 26 days ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi