Sciweavers

704 search results - page 118 / 141
» Resource Access Control for an Internet User Agent
Sort
View
TWC
2008
154views more  TWC 2008»
14 years 9 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 4 months ago
Flexible Single Sign-On for SIP: Bridging the Identity Chasm
—Identity federation is a key requirement for today’s distributed services. This technology allows managed sharing of users’ identity information between identity providers (...
Pin Nie, Juha-Matti Tapio, Sasu Tarkoma, Jani Heik...
IPPS
2008
IEEE
15 years 4 months ago
CoSL: A coordinated statistical learning approach to measuring the capacity of multi-tier websites
Website capacity determination is crucial to measurement-based access control, because it determines when to turn away excessive client requests to guarantee consistent service qu...
Jia Rao, Cheng-Zhong Xu
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 4 months ago
A Session-Initiation-Protocol-Based Middleware for Multi-Application Management
Abstract—The deployment of multimedia services in nextgeneration networks is a challenge due to the high configuration complexity of the streaming process in different stationary...
Teodora Guenkova-Luy, Holger Schmidt, Andreas Scho...
GRID
2005
Springer
15 years 3 months ago
Protecting grid data transfer services with active network interfaces
A key goal of grid computing is to provide seamless access to shared computational and data resources across organizational boundaries, in distributed virtual organizations. Grid ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...