• No results found

network-level access control

A survey on security issues and solutions at different layers of Cloud computing

A survey on security issues and solutions at different layers of Cloud computing

... of control over resources, they have to rely on trust mechanisms and contracts in conjunction with mechanisms that provide a ...of network and system monitoring to user poses a trust ...inherent ...

31

Robust access control framework for mobile cloud computing network

Robust access control framework for mobile cloud computing network

... employees access the data using desktops with predefined security ...to access the data from anywhere and ...as access control designed for traditional setup are not su ffi cient when ...

15

Artificial Neural Network Based Prediction Mechanism for Wireless Network on Chips Medium Access Control

Artificial Neural Network Based Prediction Mechanism for Wireless Network on Chips Medium Access Control

... The NoC architectures (i.e. Mesh and WiMesh) are characterized using a cycle accurate NoC simulator that accurately models the progression of the flits over the switches and links per cycle as shown in Fig. 9. The ...

53

Multi-level delegations with trust management in access control systems

Multi-level delegations with trust management in access control systems

... a framework based on a policy language and an interaction model for regulating access to network services. Their trust establishment framework uses logical rules for accessing services and avoiding the ...

22

Medium Access Control with Token Approach in Wireless Sensor Network

Medium Access Control with Token Approach in Wireless Sensor Network

... Fig 4: Frame Structure for Token Message SendID is a node id for sending node, Li is level value, FT is flag token either 0 or 1, NCT is a node's control token at that time, and NHT is the next node that ...

7

StrongNet: an international network to improve diagnostics and access to treatment for strongyloidiasis control

StrongNet: an international network to improve diagnostics and access to treatment for strongyloidiasis control

... to control strongyloidiasis (market analysis), which is an essential prerequisite for any drug donation program that may potentially ...and control community, which is currently looking for ivermectin ...

12

Scalable and Secure Sharing of PHR using Distributed Attribute-Based Encryption in cloud

Scalable and Secure Sharing of PHR using Distributed Attribute-Based Encryption in cloud

... broad network access, which allows applications to be built in ways that align with how businesses operate today in mobile, multi-device, ...to control the security of the whole ...based ...

11

Network Access Control Technology—Proposition to Contain New Security Challenges

Network Access Control Technology—Proposition to Contain New Security Challenges

... application level threat intelligence of Juniper Networks standalone Intrusion Detection and Prevention (IDP) platforms as part of its ...a network threat of a particular type—policies can be configured on ...

8

On the Access Control Mechanism of Wireless Sensor Network

On the Access Control Mechanism of Wireless Sensor Network

... use, access control is of critical importance for the sensor network ...The access control mainly verifies the legitimacy of users and transfers the qualified users’ request to the ...

11

DESIGN AND IMPLEMENTATION OF ROLE BASE ACCESS CONTROL SYSTEM FOR NETWORK RESOURCES

DESIGN AND IMPLEMENTATION OF ROLE BASE ACCESS CONTROL SYSTEM FOR NETWORK RESOURCES

... Based Access Control is very useful for providing a high level description of access control for organizational ...to access only authorized ...to control accessing ...

5

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Access Control And Intrusion Detection For Security In Wireless Sensor Network

... security access is one of the key component. Nodes in a wireless sensor network may be lost due to power exhaustion or malicious ...sensor network, access control is required in the ...

5

Access Control Framework for Social Network System using Ontology

Access Control Framework for Social Network System using Ontology

... innovative access control framework for SNS using ontology, an ontology based access control model based on Semantic Web standards that empowers the individual users of a social networking ...

9

Case Study on Technical Challenge of Access Control for Femtocell Network

Case Study on Technical Challenge of Access Control for Femtocell Network

... This condition was placed by IEEE 802.11 on all aspects of Internet connection for the mobile provider, such condition were an equal signal to noise ratio, loss, time response and frequency sharing etc. The motivation is ...

5

Selective Control of Access of Photo Sharing on Online Social Network

Selective Control of Access of Photo Sharing on Online Social Network

... The proposed scheme is very useful in protecting users’ privacy in photo/image sharing over online social networks. However, there always exist trade-off between privacy and utility. Preserving user privacy and making ...

8

Network Load Aware Adaptive Channel Access Control for WLAN

Network Load Aware Adaptive Channel Access Control for WLAN

... channel access competition ability between AP and non-AP stations (STAs) which is because that AP almost has the same channel access competition ability with one non-AP STA while the number of non-AP STAs ...

6

Robust access control framework for mobile cloud computing network

Robust access control framework for mobile cloud computing network

... Permanent repository link: http://openaccess.city.ac.uk/13060/ Link to published version: http://dx.doi.org/10.1016/j.comcom.2015.07.005 Copyright and reuse: City Research Online aims to[r] ...

6

The Interaction Between Route Guidance and Signal
Control: Model Results.

The Interaction Between Route Guidance and Signal Control: Model Results.

... Network travel time as a function of signal control strategy and level of take-up; Weetwood; demand x 1.5 Network travel time as a function of signal control strategy and level of take-u[r] ...

62

Improving Performance of 802.11 MAC by Optimizing DCF in Mobile ad-hoc Network

Improving Performance of 802.11 MAC by Optimizing DCF in Mobile ad-hoc Network

... and access procedures of DCF ...medium access techniques of all these technologies and suggest a common MAC protocol for them which improves efficiency and increases throughput, at the same time is ...

5

Medium Access Control Protocol for Wireless Sensor Network – a Survey

Medium Access Control Protocol for Wireless Sensor Network – a Survey

... medium access control protocol for wireless sensor ...medium access control protocols for the sensor networks, and highlight their potency and limitations wherever ...medium access ...

5

A Paper in Mobile Ad-Hoc Networks About Maintaining its Survivability

A Paper in Mobile Ad-Hoc Networks About Maintaining its Survivability

... warranty network functionality and ...(self-healing).Survivable network s have to finally manage themselves In order to optimize the use of their resources, reducing latency and preserving the feature of ...

16

Show all 10000 documents...

Related subjects