Sciweavers

370 search results - page 71 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
AINA
2005
IEEE
15 years 3 months ago
IEEE 802.11 MAC Protocol over Wireless Mesh Networks: Problems and Perspectives
The wireless mesh network has been an emerging technology in recent years. Because the transmission medium used in networking backhaul APs is radio, the wireless mesh network is n...
Tzu-Jane Tsai, Ju-Wei Chen
ICAIL
2007
ACM
15 years 1 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
PERVASIVE
2011
Springer
14 years 9 days ago
Designing Shared Public Display Networks - Implications from Today's Paper-Based Notice Areas
Large public displays have become a regular conceptual element in many shops and businesses, where they advertise products or highlight upcoming events. In our work, we are interes...
Florian Alt, Nemanja Memarovic, Ivan Elhart, Domin...
RTSS
2008
IEEE
15 years 3 months ago
Predictable Interrupt Management and Scheduling in the Composite Component-Based System
This paper presents the design of user-level scheduling hierarchies in the Composite component-based system. The motivation for this is centered around the design of a system that...
Gabriel Parmer, Richard West
IWAN
2000
Springer
15 years 1 months ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...