Sciweavers

1446 search results - page 141 / 290
» Network Access Control (NAC)
Sort
View
SWS
2004
ACM
15 years 3 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
CCS
2009
ACM
15 years 10 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
SIGMOD
2007
ACM
150views Database» more  SIGMOD 2007»
15 years 10 months ago
System design issues in sensor databases
In-network sensor query processing systems (ISQPs), or sensor databases, have been developed to acquire, process and aggregate data from wireless sensor networks (WSNs). Because W...
Qiong Luo, Hejun Wu
MM
2004
ACM
145views Multimedia» more  MM 2004»
15 years 3 months ago
Proportional service differentiation in wireless LANs using spacing-based channel occupancy regulation
In this paper, we propose Spacing-based Channel Occupancy Regulation (SCORE) MAC protocol that provides proportional service differentiation in terms of normalized throughput in w...
Qi Xue, Aura Ganz
ISPAN
2000
IEEE
15 years 2 months ago
User Level Communication on Alpha Linux Systems
Recent advances in commodity network interface technology enable scientists and engineers to build clusters of workstations or PCs to execute parallel applications. However, raw-h...
Jie Chen, William A. Watson III