Sciweavers

1383 search results - page 204 / 277
» Computational Mechanisms for Distributed Requirements Engine...
Sort
View
COLCOM
2008
IEEE
15 years 12 months ago
Access Control Model for Sharing Composite Electronic Health Records
The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of...
Jing Jin, Gail-Joon Ahn, Michael J. Covington, Xin...
ICDCSW
2005
IEEE
15 years 11 months ago
On Optimal TTL Sequence-Based Route Discovery in MANETs
In on-demand multi-hop routing protocols for MANETs such as DSR and AODV, a fundamental requirement for peer-to-peer connectivity is to discover routes to a remote node via flood...
Dimitrios Koutsonikolas, Saumitra M. Das, Himabind...
CCGRID
2003
IEEE
15 years 10 months ago
RelayCast: A Middleware for Application-level Multicast Services
Application-level multicast (ALM) is being increasingly recognized as a solution to support multipoint applications without the need for a network layer multicast protocol. Though...
Nodoka Mimura, Kiyohide Nakauchi, Hiroyuki Morikaw...
DSN
2003
IEEE
15 years 10 months ago
Detection and Handling of MAC Layer Misbehavior in Wireless Networks
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish...
Pradeep Kyasanur, Nitin H. Vaidya
POLICY
2001
Springer
15 years 9 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...