Sciweavers

152 search results - page 21 / 31
» Flow Control Techniques for Multicasting in Gigabit Networks
Sort
View
COMCOM
2004
79views more  COMCOM 2004»
14 years 11 months ago
Interdomain traffic engineering with redistribution communities
Various traffic engineering techniques are used to control the flow of IP packets inside large ISP networks. However, few techniques have been proposed to control the flow of pack...
Bruno Quoitin, Sébastien Tandel, Steve Uhli...
ACSAC
2000
IEEE
15 years 4 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
COMCOM
2004
98views more  COMCOM 2004»
14 years 11 months ago
End system multicast: an architectural infrastructure and topological optimization
Although IP-multicast has been proposed and investigated for years, there are major problems inherent in the IP-multicasting technique, e.g., difficulty to scale up the system, di...
Starsky H. Y. Wong, John C. S. Lui
WORM
2004
15 years 1 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
APNOMS
2006
Springer
15 years 3 months ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang