نتایج جستجو برای: heterogeneous security complex
تعداد نتایج: 1059368 فیلتر نتایج به سال:
Security is becoming an increasingly important issue in the design of multimedia applications, which are widely used in the industry and academic organizations. However, existing scheduling schemes for realtime multimedia service in heterogeneous networks generally do not take into account security requirements when making allocation and control decisions. In this paper, we develop and evaluate...
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services an RMS needs to manage, a ...
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services an RMS needs to manage , a...
Page 1 (9) Abstract—New security considerations arise if context transfer is to be employed in the Ambient Network architecture. In this paper we investigate, new security requirements and considerations for context transfer in Ambient Networks, the transfer of security state information, the provisioning of security support of session mobility using context transfer, and finally an analysis of...
The paper gives an overview on the meta-data specification for administrating and enforcing enterprisewide security for heterogeneous and distributed information systems. The meta-data serves as a basis to maintain enterprise-wide security information centrally, to integrate isolated security specifications, to keep the consistency between different security policies, and to perform access cont...
FIPA (Foundation for Intelligent Physical Agents) specifications are being proposed as the open standards for heterogeneous agency interaction. We examine the notions of trust and security inherent in the core or normative FIPA specifications and in the existing preliminary security specifications. We highlight its strengths and weaknesses and discuss the steps needed to improve security in the...
Wireless Sensor Networks (WSNs) are prone to security attacks. In order to protect the network from potential adversaries, it is necessary to secure communications between sensor nodes. Also, if we consider a network of heterogeneous objects including WSNs, security requirements may be far more complex. In particular, a single application may deal with multiple different traffic flows, each one...
This paper presents a new approach to model complex heterogeneous objects with simultaneous geometry intricacies as well as complex material distributions. Different from most of the existing approaches, which utilize manifold B-Rep and the assembly representations, the proposed scheme takes advantage of the non-manifold cellular representations to model the geometries of the heterogeneous obje...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید