نتایج جستجو برای: media access control
تعداد نتایج: 1852182 فیلتر نتایج به سال:
Partial encryption is often used as a tradeoff between security and performance to protect scalable video data. In this paper, we argue that although partial encryption is strong enough for access control, it is not adequate for content confidentiality protection. We conduct experiments to show that partially encrypted H.264/SVC (scalable video coding) streams leak significant content informati...
Performance of Wireless LAN can be improved at each layer of the protocol stack with respect to energy efficiency. The Media Access Control layer is responsible for the key functions like access control and flow control. During contention, Backoff algorithm is used to gain access to the medium with minimum probability of collision. After studying different variations of back off algorithms that...
In this paper the design of a multiservice MAC (Medium Access Control) protocol, as a candidate for the uplink communication channel for LEO constellations is proposed. The proposed scheme is just the combination of conventional PRMA protocol and CDMA techniques, which seems to be a very promising access method for the case of mixed voice/data traffic. A transmit permission technique based on D...
In this paper we propose and evaluate a Medium Access Control (MAC) protocol for the efficient integration of high quality video traffic with ftp data packet traffic over a wireless cellular channel of very high capacity. We envision a system where the mobile terminals are considered to be high performance devices with extended storage capabilities which can act like cache memories streaming mu...
Uncertainty in crises often leads to knowledge gaps, which can be bridged through people’s communication, resulting in sensemaking. Because research dealing with the identification of roles to examine how they guide sensemaking is almost non-existent, this paper seeks to clarify this problem. In the context of crisis communication related to the Brussels bombings in 2016, first social network a...
As computers become more capable, researchers of all types are finding it necessary to store massive quantities of data generated by simulations or experiments and to retrieve them at high rate for analysis or visualization. As a consequence, strong needs have arisen for storage systems tuned for particular needs; significant improvements in storage speed and access control; optimized wide-area...
GENERALIZATION AND ENFORCEMENT OF ROLE-BASED ACCESS CONTROL USING A NOVEL EVENT-BASED APPROACH
Attribute-based Access Control (ABAC) was recently proposed as a general model which is able to capture the main existing access control models. This paper discusses the problems of configuring ABAC and engineering access policies. We question how to design attributes, how to assign attributes to subjects, objects, actions, and how to formulate access policies which bind subjects to objects and...
The United Kingdom National Health Service strategy is to have a full electronic health records service available nationally by 2008. Secure, scalable, access control infrastructure will be critical to the success of such an initiative. To this end, a prototype for such a service, built over the OASIS role-based access control architecture is presented. How the implementation achieves scalabili...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید