Sciweavers

534 search results - page 42 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
CODASPY
2012
13 years 7 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
CBSE
2011
Springer
13 years 11 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
AINA
2007
IEEE
15 years 6 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay
MOBICOM
2004
ACM
15 years 5 months ago
PAVAN: a policy framework for content availabilty in vehicular ad-hoc networks
Advances in wireless communication, storage and processing are realizing next-generation in-vehicle entertainment systems. Even if hundreds of different video or audio titles are...
Shahram Ghandeharizadeh, Shyam Kapadia, Bhaskar Kr...
GLOBECOM
2006
IEEE
15 years 5 months ago
Multi-Fasnet Protocol: Short-Term Fairness Control in WDM Slotted MANs
— Single-hop wavelength division multiplexing (WDM) ring networks operating in packet mode are a promising architecture for the design of innovate Metropolitan Area Networks. The...
Andrea Bianco, Davide Cuda, Jorge M. Finochietto, ...