Sciweavers

1630 search results - page 136 / 326
» Secure Overlay Network Design
Sort
View
SIGCOMM
2009
ACM
15 years 4 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
ACMSE
2006
ACM
15 years 4 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
CCR
2002
111views more  CCR 2002»
14 years 9 months ago
A taxonomy and design considerations for Internet accounting
Economic principles are increasingly being suggested for addressing some complex issues related to distributed resource allocation for QoS (Quality of Service) enhancement. Many p...
Michel Kouadio, Udo W. Pooch
IADIS
2004
14 years 11 months ago
Design issues and managing method of integrated gateway system for mobile internet service
IMT-2000 has been developing in both cdma2000 and W-CDMA, and their convergence or harmonization has also been discussed in several standard organizations. Besides the most expert...
Soon-Choul Kim, Jae-Hong Ryu, Won Ryu
SIGCOMM
2009
ACM
15 years 4 months ago
Passive aggressive measurement with MGRP
We present the Measurement Manager Protocol (MGRP), an in-kernel service that schedules and transmits probes on behalf of active measurement tools. Unlike prior measurement servic...
Pavlos Papageorge, Justin McCann, Michael Hicks