Sciweavers

209 search results - page 19 / 42
» Exploiting Information Relationships for Access Control
Sort
View
CN
2007
80views more  CN 2007»
14 years 9 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
DISCEX
2003
IEEE
15 years 2 months ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
ICC
2007
IEEE
15 years 3 months ago
Design and Evaluation of IP Header Compression for Cellular-Controlled P2P Networks
Abstract— In this paper we advocate to exploit terminal cooperation to stabilize IP communication using header compression. The terminal cooperation is based on direct communicat...
Tatiana K. Madsen, Qi Zhang, Frank H. P. Fitzek, M...
91
Voted
COMCOM
2007
100views more  COMCOM 2007»
14 years 9 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
JSAC
2006
116views more  JSAC 2006»
14 years 9 months ago
A position-based QoS routing scheme for UWB mobile ad hoc networks
Ultra-wideband (UWB) wireless communication is a promising spread-spectrum technology that supports very high data rates and provides precise position information of mobile users. ...
Atef Abdrabou, Weihua Zhuang