Sciweavers

3452 search results - page 638 / 691
» Secure Data Outsourcing
Sort
View
102
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 20 days ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
105
Voted
ADHOC
2006
95views more  ADHOC 2006»
15 years 19 days ago
LHAP: A lightweight network access control protocol for ad hoc networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the ...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
124
Voted
ALIFE
2006
15 years 19 days ago
A Comprehensive Overview of the Applications of Artificial Life
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...
Kyung-Joong Kim, Sung-Bae Cho
112
Voted
FGCS
2008
159views more  FGCS 2008»
15 years 19 days ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
IANDC
2008
128views more  IANDC 2008»
15 years 19 days ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...