Search
Now showing items 11-15 of 15
Performance evaluation of kerberos cross-realm authentication using SIMNET
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Today, the network is being implemented in such a manner that consist of geographi-
cally diverse clients and distributed as well as centralized servers. To prevent unauthorized access to system resources such as servers, ...
Prolog based approach to reasoning about dynamic hierarchical key assignment schemes
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of ...
Web services policy in grid
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
Service-oriented computing enables service providers to publish their business functionalities in the form of abstract contracts, which can be discovered by service consumers based on open and standard protocols. Enterprise ...
Packet forwarding strategies for cooperation enforcement in mobile wireless ad hoc networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
In self-organized ad hoc networks, all networking functions rely on the contri-
bution of the relay nodes. Nodes have to forward packets for each other in order
to enable multi-hop communication. In recent years, researchers ...
Generalized data extraction protocol for habitat monitoring applications in WSNs
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Habitat monitoring applications use WSNs to gather data about environment and migration patterns of animals. This data is used by biologists to analyze the life and behavior of animals in different environments. The ...