We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
The congestion control mechanisms of TCP make it vulnerable in an environment where flows with different congestionsensitivity compete for scarce resources. With the increasing am...
This paper describes our approach of utilizing a computational environment to apply a learner’s learning process as a first class object. With this approach, the learner’s le...
To be agile and cost effective, data centers should allow dynamic resource allocation across large server pools. In particular, the data center network should enable any server to...
Albert G. Greenberg, James R. Hamilton, Navendu Ja...
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...