• No results found

[PDF] Top 20 A Dynamic Access Control Method for SDN

Has 10000 "A Dynamic Access Control Method for SDN" found on our website. Below are the top 20 most common "A Dynamic Access Control Method for SDN".

A Dynamic Access Control Method for SDN

A Dynamic Access Control Method for SDN

... in SDN (Software Defined Network) environment and it is difficult to implement fine-grained access control, utilizing the characteristics of SDN transfer control separation and software ... See full document

11

A bat algorithm for SDN network scheduling

A bat algorithm for SDN network scheduling

... the control plane from data plane [5]. SDN introduces new possibilities for network management and configuration ...the control plane. SDN depart from traditional network architectures by ... See full document

9

On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage

On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage

... Access control is a mechanism that enables an authority to control access to restricted areas and resources at a given physical facility or computer-based information ...in access ... See full document

8

SDN-based Network Control Method for Distributed Storage Systems

SDN-based Network Control Method for Distributed Storage Systems

... In the second case, namely the practical use of resources, DSSs are typically deployed on Data Center Networks (DCNs) using common topologies, such as a three-layer non-blocking fully populated network (FPN) or ... See full document

12

Dynamic Routing Method over Hybrid SDN for Flying Ad Hoc Networks

Alaa Taima Albu-Salih |	Seyed Amin Hosseini Seno |Saad Jasim Mohammed

Dynamic Routing Method over Hybrid SDN for Flying Ad Hoc Networks Alaa Taima Albu-Salih | Seyed Amin Hosseini Seno |Saad Jasim Mohammed

... new dynamic routing Strategy based on Hybrid SDN (SDN controler and distributed routing protocol) to solve these ...proposed method can reduce the average delay, normalized routing load, and ... See full document

8

An Efficient Energy Conservation Dynamic Consistency Algorithm for SDN Control Plane

An Efficient Energy Conservation Dynamic Consistency Algorithm for SDN Control Plane

... of SDN controller is mainly achieving through the distributed data storage system [7] ...synchronization method is ...adds control algorithms to the infrastructure to enhance the consistency of the ... See full document

8

Dynamic Access Control For Information Technology Service Management

Dynamic Access Control For Information Technology Service Management

... most access-control facilities have been based primarily on identity management ...requires access to an object from another organization, a supplementary account has to be created, as suggested by ... See full document

6

Exploring Dynamic Constraint Enforcement and Efficiency in Access Control

Exploring Dynamic Constraint Enforcement and Efficiency in Access Control

... of dynamic constraints requires either design-time projections of run-time events or integration of efficient run-time procedures to the actual policy evaluation pro- ...the access control decision ... See full document

107

Access Control of Medical Images using Elliptic Curve Cryptography through Effective Multi-Key Management in a Mobile Multicasting Environment

Access Control of Medical Images using Elliptic Curve Cryptography through Effective Multi-Key Management in a Mobile Multicasting Environment

... a dynamic and flexible access control method to ensure the right access by the right user at the right ...fixed access levels or roles for ...the access levels of the ... See full document

11

Software defined VANET and Information propagation System

Software defined VANET and Information propagation System

... • SDN Assisted VANET Safety Service: Improvingroad safety through the use of V2V communications isone of the primary use cases of ...The SDN controller canassign flows to these channels or remove them ... See full document

6

The Method of Dynamic Access Control against Data Leakage and Data Misuse

The Method of Dynamic Access Control against Data Leakage and Data Misuse

... Group-Based Access control (GBAC) mechanism that is a generalization of RBAC ...This method uses, additionally to the user’s basic description (role), the user characteristics and activity attributes ... See full document

8

A binary access control scheme with single key

A binary access control scheme with single key

... the access right of the user is computed by operations on lock and ...the dynamic access control such as adding or deleting files or users, the keys or locks should be ...key access ... See full document

10

Multi domain SDN controller federation in hybrid FiWi MANET networks

Multi domain SDN controller federation in hybrid FiWi MANET networks

... the access network, we adopt differentiated management for regular and special ...very dynamic way, ...FiWi SDN controller does not need to differentiate among flows to/from different ...to ... See full document

19

Dynamic Programming Method For Impulsive Control Problems

Dynamic Programming Method For Impulsive Control Problems

... optimal control of production- inventory model. Stochastic control problems seem to be a simple idea of nudging a stochastic process in one direction or another as it flows through ...stochastic ... See full document

134

TEXTURE PATTERN IN ABNORMAL MAMMOGRAMS CLASSIFICATION USING SUPERVISED MACHINE 
LEARNING TECHNIQUES

TEXTURE PATTERN IN ABNORMAL MAMMOGRAMS CLASSIFICATION USING SUPERVISED MACHINE LEARNING TECHNIQUES

... [4]. SDN technology provides new opportunities for network management, simplifies automation of its administration and reduces the cost of network equipment, reduces dependency on vendor lock, opens up new ... See full document

9

Q learning based dynamic joint control of interference and transmission opportunities for cognitive radio

Q learning based dynamic joint control of interference and transmission opportunities for cognitive radio

... In this section, we describe the proposed reward function of the Q-learning-based dynamic sensing time and report- ing interval selection algorithm for the sensor. A false alarm depends on the sensing time from ... See full document

24

Dynamic position changeable Stackelberg game for user provided network control algorithms

Dynamic position changeable Stackelberg game for user provided network control algorithms

... Nowadays, wireless mobile services have been going through a paradigm shift due to three reasons: (i) the increasing needs for ubiquitous connectivity, (ii) an unprecedented volume of mobile data traffic, and (iii) ... See full document

13

Admission Control and Interference Management in Dynamic Spectrum Access Networks

Admission Control and Interference Management in Dynamic Spectrum Access Networks

... make dynamic spectrum access work in practice: the admission policy of secondary users (SUs) to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary ... See full document

11

An Access Control Model for Web Services with Dynamic Separation of Duty Rules

An Access Control Model for Web Services with Dynamic Separation of Duty Rules

... challenges. Access control is an important security mechanism for organizations to protect their resources in collaborative environments and ...Different access control models and mechanisms ... See full document

8

A Dynamic Model for the Control of a Room’s Temperature by Means of Ceiling Cooling

A Dynamic Model for the Control of a Room’s Temperature by Means of Ceiling Cooling

... Control of the temperature of the room by means of the air system shows a decrease in the time delay and an increase of the amplitude of the maximum cooling load, in comparison with ceiling cooling. When ... See full document

5

Show all 10000 documents...