Sciweavers

3751 search results - page 562 / 751
» Events in security protocols
Sort
View
ITIIS
2010
192views more  ITIIS 2010»
14 years 11 months ago
Large-Scale Integrated Network System Simulation with DEVS-Suite
Formidable growth of Internet technologies has revealed challenging issues about its scale and performance evaluation. Modeling and simulation play a central role in the evaluatio...
Ahmet Zengin
104
Voted
GLOBECOM
2010
IEEE
14 years 10 months ago
A Cluster-Head Selection and Update Algorithm for Ad Hoc Networks
Abstract--A novel cluster-head selection and update algorithm "Typebased Cluster-forming Algorithm (TCA)" is proposed, which outperforms both the lowest node ID (LID) and...
Hao Wu, Zhangdui Zhong, Lajos Hanzo
CCS
2009
ACM
16 years 1 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
127
Voted
SACMAT
2006
ACM
15 years 6 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
283
Voted
NETGAMES
2006
ACM
15 years 6 months ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...