Sciweavers

868 search results - page 40 / 174
» Resiliency policies in access control
Sort
View
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
15 years 6 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
TIP
2008
85views more  TIP 2008»
14 years 11 months ago
Resource Allocation for Error Resilient Video Coding Over AWGN Using Optimization Approach
The number of slices for error resilient video coding is jointly optimized with 802.11a-like media access control and the physical layers with automatic repeat request and rate com...
Cheolhong An, Truong Q. Nguyen
CADE
2011
Springer
13 years 11 months ago
ASASP: Automated Symbolic Analysis of Security Policies
We describe asasp, a symbolic reachability procedure for the analysis of administrative access control policies. The tool represents access policies and their administrative action...
Francesco Alberti, Alessandro Armando, Silvio Rani...
TCOM
2010
133views more  TCOM 2010»
14 years 10 months ago
Transmission control in cognitive radio as a Markovian dynamic game: Structural result on randomized threshold policies
Abstract——This paper considers an uplink time division multiple access (TDMA) cognitive radio network where multiple cognitive radios (secondary users) attempt to access a spect...
J. Huang, V. Krishnamurthy
JSAC
2011
115views more  JSAC 2011»
14 years 6 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...