www.bookin.org.ru Книги Интернет магазин +79015461416

    есть на складе           
Салаты сборник рецептов

 A Policy-based Security Framework for Ad-Hoc Networks. Secure Formation, Evolution and Management
Наименование:

A Policy-based Security Framework for Ad-Hoc Networks. Secure Formation, Evolution and Management

автор Sye L.K. издательство Книга по Требованию Локальные и корпоративные сети
Cтраниц 244        мягкая обложка       
Аннотация:The establishment of this community is based on a doctrine that defines the roles of participants, the characteristics that participants must exhibit in order to be eligible to join the community in a specific role, as well as policies governing their behaviour within the community. Authentication of devices and verification of credentials rely on security information available in the device as well as information provided by the doctrine and by other peers in the community. This thesis introduces an integrated security framework that enables secure formation, evolution and management of ad-hoc networks. A prototype implementation has been developed and then simulated in order to demonstrate its practical feasibility. The framework also optimises the access control mechanism by reducing the redundancy in the verification of credentials. Lightweight management and security protocols are designed to facilitate the interaction in the community. An ad-hoc network is perceived as a community of autonomous devices interconnected through wireless links.
Автор: Sye L.K.
Издательство: Книга по Требованию
Год:2010
Цена:
3233 руб
Нет в наличии
Поиск: A Policy-based Security Framework for Ad-Hoc Networks. Secure Formation, Evolution and Management
НОВЫЙ ГОД СИМВОЛ 2013 ГОДАУКРАШЕНИЯ
КАРНАВАЛ НА НОВЫЙ ГОД РАСПРОДАЖА
Ортомолекулярная медицина Orthomol Устрание причин заболеваний. Ортомоль это новый метод для лечения и профилактики болезней. Orthomol - ортомолекулярная медицина.
Интегрированные системы управления распределенной...

Чтобы добиться согласованного управления пользователями и ресурсами и обеспечить слаженное и эффективное изменение методов доступа к необходимым для бизнеса приложениям и данным, требуется унифицированное средство, которое способно: поддерживать множество платформ (ОС, файловых систем, баз данных); поддерживать как приложения, так и системы; иметь возможность физического масштабирования на тысячи систем; обеспечивать быстрое администрирование тысяч пользователей; обеспечивать возможность администрирования на основе политики организации (policy-based), определяющей права доступа в зависимости от положения или роли пользователя в корпорации. Таким требованиям удовлетворяют интегрированные системы управления. По данным IDC, выполнение административных операций в интегрированной среде позволяет более чем вдвое снизить затрачиваемое на эти задачи время для 100 пользователей. Для примера: управляющее приложение ME 10 User Admi is ra io задает единый шаблон для учетных данных пользователя на разнородных системах и позволяет модифицировать эти данные с помощью только одной операции. 3.3 Операционная доступность Эффективность развертывания приложений и систем управления пользователями и ресурсами в распределенной среде напрямую влияет на эффективность работы организации.
Швабра-вертушка "Торнадо Хенди".
Швабра для пола "Торнадо" обладает крутящейся насадкой из микрофибры, обеспечивающей отличное впитывание грязи и жидкости во
1385 руб
Раздел: Швабры и наборы
Ручка "Автомат", 12 штук, в коробке.
Любовь сильного пола к различного рода оружию известна с давних пор. Но если настоящий автомат в руках подержать может далеко не каждый,
449 руб
Раздел: Оригинальные ручки
Quality-of-Service and Security in Mobile Ad hoc Networks. Denial-Of-Service Resistant Quality-Of-Service Provisioning for Mobile Ad hoc NetworksQuality-of-Service and Security in Mobile Ad hoc Networks. Denial-Of-Service Resistant Quality-Of-Service Provisioning for Mobile Ad hoc
It also considers the problem of allocating bandwidth to a set of traffic flows at a statistical multiplexer to provide both QoS and resistance to the discussed DoS attacks. Книга по Требованию  
2007 руб
A Dominating Set Based Approach Topology Control for Mobile Ad hoc Networks.A Dominating Set Based Approach Topology Control for Mobile Ad hoc Networks.
In this book, we aim to design and implement algorithms in a distributed environment in order to solve clustering, backbone formation and efficient routing problems for mobile ad hoc networks(MANET)s. Deniz C. Книга по Требованию  
2007 руб
PERFORMANCE OF WIRELESS AD HOC NETWORKS. WITH MULTI USER DETECTION AND ENERGY CONSERVATIONPERFORMANCE OF WIRELESS AD HOC NETWORKS. WITH MULTI USER DETECTION AND ENERGY CONSERVATION
A wireless ad hoc network is a dynamic network formed on demand by a group of terminals without the aid of any pre-existing infrastructure. Jinghao X. Книга по Требованию  
2384 руб
A Generalized Technique Broadcast Protocols in Mobile Ad Hoc Networks.A Generalized Technique Broadcast Protocols in Mobile Ad Hoc Networks.
The book is intended for professionals and researchers in the communications industry and academia. Abdelmajid K. Книга по Требованию  
2768 руб
MAC LAYER AND ROUTING PROTOCOLS FOR HETEROGENEOUS AD HOC NETWORKS. ROUTING IN HETEROGENEOUS AD HOC NETWORKS WITH ASYMMETRIC LINKS AND PERFORMANCE EVALUATION STUDIESMAC LAYER AND ROUTING PROTOCOLS FOR HETEROGENEOUS AD HOC NETWORKS. ROUTING IN HETEROGENEOUS AD HOC NETWORKS WITH ASYMMETRIC LINKS AND PERFORMANCE EVALUATION
Furthermore, the hidden node problem requires a more careful analysis in the case of asymmetric links. Guoqiang W. Книга по Требованию  
3233 руб
A holistic Approach Quality of Service Support in Mobile Ad Hoc Networks.A holistic Approach Quality of Service Support in Mobile Ad Hoc Networks.
Given that in MANETs there is no dedicated central agency to manage and regulate the channel resources while also bandwidth itself is not abundant, the network-level QoS mechanisms cannot work, unless the MAC ensures orderly access to the shared Sivapathalingham S. Книга по Требованию  
3050 руб
Cooperative Retransmission Protocols for Wireless Ad-Hoc Networks. Issues, Solutions and Applications to Dynamic Spectrum Allocation and Cognitive RadioCooperative Retransmission Protocols for Wireless Ad-Hoc Networks. Issues, Solutions and Applications to Dynamic Spectrum Allocation and Cognitive
Provided solutions avoid commons-model cognitive radio strict sensing requirements and regulatory and taxonomy issues of a property-rights model. Igor S. Книга по Требованию  
2625 руб
A Framework for Scalable IP Anycast Protocol An Efficient Anycasting Scheme in Ad-hoc Wireless Networks.A Framework for Scalable IP Anycast Protocol An Efficient Anycasting Scheme in Ad-hoc Wireless Networks.
This work presents an efficient anycasting scheme in ad-hoc wireless networks. Shyr-Kuen C. Книга по Требованию  
2007 руб
QoS Frameworks for Ad-Hoc and Heterogeneous Netwoks. QoS Gateway DesignQoS Frameworks for Ad-Hoc and Heterogeneous Netwoks. QoS Gateway Design
The fundamental differences between the two networks form the heterogeneous environment of the PYLON-Lite model. Yasser M. Книга по Требованию  
2768 руб
International Crimes and the Ad Hoc TribunalsInternational Crimes and the Ad Hoc Tribunals
It states the law of the Tribunals, and provides concrete illustrations of the application of the law to a variety of criminal cases, providing a comprehensive and detailed analysis of this voluminous body of Mettraux G. Oxford University Press  
2228 руб
Bewertung der Zuverlaessigkeit von Dienstanbietern in Mobilen Ad-hoc Netzwerken. Ansaetze zur verbesserten Auswahl von DienstanbieternBewertung der Zuverlaessigkeit von Dienstanbietern in Mobilen Ad-hoc Netzwerken. Ansaetze zur verbesserten Auswahl von
Die unbewusste Auswahl eines Dienstanbieters zur Durchfuehrung einer verteilten Dienstnutzung kann somit leicht zu einem fruehzeitigen Abbruch der Dienstnutzung fuehren, zum Beispiel durch Auswahl eines Anbieters mit erschoepfter Andreas T. Книга по Требованию  
2768 руб
Topologieoptimierung in Mobilen Ad Hoc und Sensornetzwerken. Systematische Evaluierung und Vergleich dezentraler Algorithmen zur optimierten Vernetzung selbstorganisierender SystemeTopologieoptimierung in Mobilen Ad Hoc und Sensornetzwerken. Systematische Evaluierung und Vergleich dezentraler Algorithmen zur optimierten Vernetzung
In den Simulationen werden deshalb Normalverteilungen fuer die Positionierung der Netzelemente verwendet. Matthias V. Книга по Требованию  
2007 руб
Adopting ISO 17799 Information Security FrameWork. for Billing Information System The case of Ethiopian Telecommunication CorporationAdopting ISO 17799 Information Security FrameWork. for Billing Information System The case of Ethiopian Telecommunication
The data was collected using questionnaires, interview and observation. Milkias B. Книга по Требованию  
2007 руб
Ad hoc On-Demand Distance Vector RoutingAd hoc On-Demand Distance Vector Routing
In contrast, the most common routing protocols of the Internet are proactive, meaning they find routing paths independently of the usage of the paths. Kristen N.H. Книга по Требованию  
1190 руб
Security of Java based AJAX frameworks. Security challenges in the Web 2.0 eraSecurity of Java based AJAX frameworks. Security challenges in the Web 2.0 era
The findings of this paper help software architects and developers to get a practical understanding of potential attacks. Georg R. Книга по Требованию  
2007 руб
Attacks on Wireless LANs. About the security of IEEE 802.11 based wireless networksAttacks on Wireless LANs. About the security of IEEE 802.11 based wireless networks
This book is intended for network operators, who want to learn more about wireless security, and also for cryptographers, who want to understand the theoretical background of these attacks. Erik T. Книга по Требованию  
2415 руб
Secure Content Access and Replication in Peer-to-Peer Networks. A Certificate-based ApproachSecure Content Access and Replication in Peer-to-Peer Networks. A Certificate-based Approach
The study and analysis of the state-of-the-art on security in Peer-to-Peer (P2P) networks gives us many important insights regarding the lack of practical security mechanisms in such fully decentralized and highly dynamic Esther P. Книга по Требованию  
3233 руб
Security and Privacy Issues in Special-Purpose Networks. Open problems and solutionsSecurity and Privacy Issues in Special-Purpose Networks. Open problems and solutions
Sensor networks have a wide variety of applications related to event surveillance like emergency response or habitat monitoring. Alexandre V. Книга по Требованию  
1980 руб
ADAPTIVE ESTIMATION FOR CONTROL OF UNCERTAIN NONLINEAR SYSTEMS WITH APPLICATIONS TO TARGET TRACKING ADAPTIVE NEURAL NETWORK BASED TARGET TRACKING.ADAPTIVE ESTIMATION FOR CONTROL OF UNCERTAIN NONLINEAR SYSTEMS WITH APPLICATIONS TO TARGET TRACKING ADAPTIVE NEURAL NETWORK BASED TARGET
The most popular approach is the extended Kalman filter (EKF) that goes through significant degradation in the presence of unmodeled nonlinearities. Venkatesh M. Книга по Требованию  
2746 руб
Caspian Dreams. U.S. and Chinese Energy Security Policies in the Caspian RegionCaspian Dreams. U.S. and Chinese Energy Security Policies in the Caspian Region
This is a case study looking at the policies of China and the U. S. in the Caspian Sea region, which is an emerging (or arguably re-emerging) oil producing region in a global context. Sigve R. L. Книга по Требованию  
2384 руб
A Context Sensor Development Framework. for SOA-based Collaborative Working EnvironmentsA Context Sensor Development Framework. for SOA-based Collaborative Working Environments
In collaborative working environments (CWE), context describes people, artefacts, activities and resources. Florian S. Книга по Требованию  
3214 руб
An Integrated Approach with Inventory Stocking, Time-based Service and Part Commonality Network Design for Service Parts Logistics.An Integrated Approach with Inventory Stocking, Time-based Service and Part Commonality Network Design for Service Parts
Results from extensive computational experiments on a variety of problem instances based on real-life industrial data show the effectiveness of the overall approach. Vishv J. Книга по Требованию  
2402 руб
Entanglement distribution in quantum networks. An investigation of the properties of communication networks based on the laws of quantum physicsEntanglement distribution in quantum networks. An investigation of the properties of communication networks based on the laws of quantum
It is considered that neighboring stations share one partially entangled pair of qubits, which emphasizes the difficulty of creating remote entanglement in realistic settings. Sebastien P. Книга по Требованию  
2361 руб
A Security Architecture for the Wireless Control Network Sindrion. Analysis and Development of a Security Architecture for Wireless Sensor Networks Exemplifying the Sindrion SystemA Security Architecture for the Wireless Control Network Sindrion. Analysis and Development of a Security Architecture for Wireless Sensor Networks Exemplifying
After a comprehensive security analysis of the present system, a security architecture called OnSec is presented. Michael S. Книга по Требованию  
2402 руб
A Service-Oriented Architecture for Social Networks. Developing a Scalable and Extensible Service Framework for Group ManagementA Service-Oriented Architecture for Social Networks. Developing a Scalable and Extensible Service Framework for Group
In the process, he explains important social network concepts and gives many practical examples. Книга по Требованию  
2007 руб
Keep the Adversary Guessing: A Decision/Game Theoretic Approach Agent Security by Policy Randomization.Keep the Adversary Guessing: A Decision/Game Theoretic Approach Agent Security by Policy Randomization.
Second, when the agent has partial model of its adversaries, we model the security domain as a Bayesian Stackelberg game. Книга по Требованию  
2007 руб
Building Blocks and Applications Secure Wireless Sensor Networks.Building Blocks and Applications Secure Wireless Sensor Networks.
Despite many security schemes have been proposed to protect building blocks such as routing and key management, some other building blocks (e. g. , mobile sink and time synchronization) are largely ignored. Hui S. Книга по Требованию  
2415 руб
GPS-Based Volcano Deformation Monitoring. A Mixed-Mode Network Processing ApproachGPS-Based Volcano Deformation Monitoring. A Mixed-Mode Network Processing Approach
A sparse network of GPS receivers surrounding the deformation zone models the regional ionosphere, and empirical corrections are applied to the inner deformation network in order to improve the achievable Volker J. Книга по Требованию  
2415 руб
European Law and Economic Policy Coordination in the European Union. A review of the legal framework of economic policy coordination in the European Union through the monetary, fiscal and supply-side policiesEuropean Law and Economic Policy Coordination in the European Union. A review of the legal framework of economic policy coordination in the European Union
Chapter 2 deals with the EU fiscal policy and is divided into two main sections: the Broad Economic Policy Guidelines and the Stability and Growth Pact. Thomas P. Книга по Требованию  
2007 руб
Design and Application for Unknown Nonlinear System A Study of Adaptive Control Based on CMAC Neural Network.Design and Application for Unknown Nonlinear System A Study of Adaptive Control Based on CMAC Neural Network.
Over the last few years, the study in adaptive intelligent control utilizing Fuzzy, Neural Network for a class of unknown nonlinear systems has attracted considerable attention. Cheng C. Книга по Требованию  
2007 руб
Next Generation Network Next Generation Network (NGN) Security. Preventing Attacks to VoIP Infrastructures
Therefore, a simulative approach seems to be the only solution. Книга по Требованию  
2007 руб
Runtime Support Framework for Agile Manufacturing Machinery. A Component-Based Approach underpinned by Advanced Virtual Engineering / Digital Manufacturing TechnologiesRuntime Support Framework for Agile Manufacturing Machinery. A Component-Based Approach underpinned by Advanced Virtual Engineering / Digital Manufacturing
This research study has contributed significantly to manufacturing and automation industries by offering a complete implementation framework for rapid human machine interface (HMI) development based on concurrent development using a virtual Seng K.C. Книга по Требованию  
3233 руб
Resilient Virtual Private Networks. Providing Resilient Quality of Service Connections in Provider-Based Virtual Private NetworksResilient Virtual Private Networks. Providing Resilient Quality of Service Connections in Provider-Based Virtual Private
As no sufficiently effective such algorithm is published we present new algorithms for computing non-resilient QoS connections too, with a run time comparable to Dijkstra’s shortest-path algorithm. Gustav F.R. Книга по Требованию  
2783 руб
Discrete Choice Models. Emphasis on Problems of Network-Based Level of Service Attributes in Travel Demand AnalysisDiscrete Choice Models. Emphasis on Problems of Network-Based Level of Service Attributes in Travel Demand Analysis
The sixth chapter addresses the problems of intrazonal trips in mode choice modeling. Bharat P. B. Книга по Требованию  
2415 руб
Securing Wireless Networks using Elliptic Curve Cryptography. Prime and Binary FieldsSecuring Wireless Networks using Elliptic Curve Cryptography. Prime and Binary Fields
Security has become a primary concern to provide protected communication in wireless networks. V. V. Книга по Требованию  
2783 руб
Simulation of a KNX network with EIBsec protocol extensions. Building a KNX network with a simulation frameworkSimulation of a KNX network with EIBsec protocol extensions. Building a KNX network with a simulation framework
The modelling of the object structure takes special care of the extensibility of the KNX/EIB network. Wolfgang K. Книга по Требованию  
2415 руб
Utility-based Resource and QoS Optimization in Packet Networks. link and network level optimizationUtility-based Resource and QoS Optimization in Packet Networks. link and network level optimization
URA assigns a utility function to each individual user flow to measure the degree of satisfaction of this user as a result of assigning a specific share of resources. Amr M. Книга по Требованию  
3233 руб
Seamless IP-diversity-based Generalized Mobility Architecture Seamless IP-diversity-based Generalized Mobility Architecture (SIGMA) A Mobility Architecture for Terrestrial and Space
Finally, the interoperability between SIGMA and existing Internet security mechanisms is discussed. Shaojian F. Книга по Требованию  
2783 руб
Simulation Optimization Using Simulated Annealing. A Network-based Implementation and Study of Cooling SchedulesSimulation Optimization Using Simulated Annealing. A Network-based Implementation and Study of Cooling Schedules
This book discusses construction of software for solving optimization problems by distributing the work load among several processors residing on a network. Nitin S. Книга по Требованию  
2007 руб
An Approach to Combine Artificial Immune Systems and Neural Networks. A Dynamic Artificial Immune System Based on the Self-Organizing MapAn Approach to Combine Artificial Immune Systems and Neural Networks. A Dynamic Artificial Immune System Based on the Self-Organizing
On that basis, an artificial immune system that rests upon the self-organizing map is implemented and demonstrated by simulations. Книга по Требованию  
2783 руб


на главную


+7 (495) 105-96-52

Киниги почтой www.bookin.org.ru Книжный интернет магазин bookin.org.ru доставка книг почтой