Sciweavers

1446 search results - page 202 / 290
» Network Access Control (NAC)
Sort
View
GLOBECOM
2009
IEEE
15 years 4 months ago
On Analyzing the Capacity of WDM PONs
—By taking advantage of the multiple wavelength provisioning capability, WDM PON dramatically enlarges its capacity as compared to TDM PON. The capacity of a WDM PON system depen...
Jingjing Zhang, Nirwan Ansari
POLICY
2009
Springer
15 years 4 months ago
Strong and Weak Policy Relations
—Access control and privacy policy relations tend to focus on decision outcomes and are very sensitive to defined terms and state. Small changes or updates to a policy language ...
Michael J. May, Carl A. Gunter, Insup Lee, Steve Z...
AINA
2007
IEEE
15 years 4 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay
AINA
2007
IEEE
15 years 4 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
NDSS
2005
IEEE
15 years 3 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...