Sciweavers

537 search results - page 30 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
NETWORKS
2007
14 years 10 months ago
Vertex disjoint routings of cycles over tori
We study the problem of designing a survivable WDM network based on covering the communication requests with subnetworks that are protected independently from each other. We consi...
Jean-Claude Bermond, Min-Li Yu
ACSAC
2007
IEEE
15 years 5 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
SACMAT
2003
ACM
15 years 4 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
ACSAC
2000
IEEE
15 years 3 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 2 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...