Sciweavers

1167 search results - page 79 / 234
» policy 2007
Sort
View
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 6 months ago
Structure and Optimality of Myopic Sensing for Opportunistic Spectrum Access
We consider opportunistic spectrum access for secondary users over multiple channels whose occupancy by primary users is modeled as discrete-time Markov processes. Due to hardware...
Qing Zhao, Bhaskar Krishnamachari
ICC
2007
IEEE
122views Communications» more  ICC 2007»
15 years 6 months ago
Detecting HTTP Tunnels with Statistical Mechanisms
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
CAISE
2007
Springer
15 years 6 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
ACSAC
2007
IEEE
15 years 6 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
IM
2007
15 years 1 months ago
Policy-driven Business Management over Web Services
Service-oriented Architecture allows for reusable services to be composed in such a way that business tasks or activities are easily satisfied. However, currently there is a abst...
Stephen Gorton, Stephan Reiff-Marganiec