Sciweavers

3712 search results - page 463 / 743
» Role-Based Access Control
Sort
View
ICASSP
2008
IEEE
15 years 11 months ago
Throughput analysis of wireless mesh networks
Wireless mesh networks are rapidly deployable for many applications. The throughput of such a network depends on the schemes used for medium access control. In this paper, we pres...
Yuan Yu, Yi Huang, Bin Zhao, Yingbo Hua
ICYCS
2008
IEEE
15 years 11 months ago
TNC-UTM: A Holistic Solution to Secure Enterprise Networks
This paper presents TNC-UTM, a holistic solution to secure enterprise networks from gateway to endpoints. Just as its name suggested, the TNC-UTM solution combines two popular tec...
Fachao Deng, An'an Luo, Yaokun Zhang, Zhen Chen, X...
IEEEARES
2008
IEEE
15 years 11 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
146
Voted
IEEEARES
2008
IEEE
15 years 11 months ago
Assessing the Reliability and Cost of Web and Grid Orchestrations
Unreliability is a characteristic feature of web and grid based computation: a call to a web or grid site may or may not succeed. An orchestration manager aims to control web or g...
Alan Stewart, Maurice Clint, Terry Harmer, Peter K...
ISCAS
2008
IEEE
77views Hardware» more  ISCAS 2008»
15 years 11 months ago
Impulse based scheme for crystal-less ULP radios
—This study describes a method of implementing a fully integrated ultra-low-power (ULP) radio for wireless sensor networks (WSNs). This is achieved using an ad hoc modulation sch...
Fabio Sebastiano, Salvatore Drago, Lucien Breems, ...