Sciweavers

1927 search results - page 329 / 386
» An Access Control Model for Location based Services
Sort
View

Publication
145views
14 years 6 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
TRIDENTCOM
2008
IEEE
15 years 4 months ago
A 3GPP system architecture evolution virtualized experimentation infrastructure for mobility prototyping
The 3GPP System Architecture Evolution (SAE) is a very attractive environment from the service provisioning perspective, thanks to the variety of access technologies and mobility ...
Miguel Gómez Rodríguez, Fermí...
MDM
2009
Springer
169views Communications» more  MDM 2009»
15 years 2 months ago
Adaptive Query Routing on Distributed Context - The COSINE Framework
Context-awareness has become a desired key feature of today’s mobile systems, yet, its realization still remains a challenge. On the one hand, mobile computing provides great po...
Lukasz Juszczyk, Harald Psaier, Atif Manzoor, Scha...
DEON
2008
Springer
14 years 11 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
INFOCOM
2010
IEEE
14 years 8 months ago
Resource Allocation over Network Dynamics without Timescale Separation
—We consider a widely applicable model of resource allocation where two sequences of events are coupled: on a continuous time axis (t), network dynamics evolve over time. On a di...
Alexandre Proutiere, Yung Yi, Tian Lan, Mung Chian...