نتایج جستجو برای: transport layer

تعداد نتایج: 539120  

Journal: :RFC 2016
Zi Hu Liang Zhu John S. Heidemann Allison Mankin Duane Wessels Paul E. Hoffman

This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead fro...

1989
Matt Bishop

We present a model of security monitoring that distinguishes between two types of logging and auditing, and from the model draw implications for the design and use of security monitoring mechanisms. We then demonstrate the usefulness of the model by analyzing several different monitoring mechanisms.

1982
Winfried Lenders

The basis of this paper is a comparative stud~ on German machine readable dictionaries which has been conducted during the last two years In connection with a research project financed by the German minister for science and technology. The aim of this project was to compare and to describe about 12 dictionaries, used in computer systems, in more or less conventional language analysis and synthe...

Journal: :IJSNet 2008
Qixiang Pang Vincent W. S. Wong Victor C. M. Leung

Reliable data delivery and congestion control are two fundamental transport layer functions. Due to the specific characteristics of Wireless Sensor Networks (WSNs), traditional transport layer protocols (e.g. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)) that are widely used in the Internet may not be suitable for WSNs. In this paper, the characteristics of WSNs are revi...

2009
Javier López Rodrigo Roman Cristina Alcaraz

As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies. Besides, it also overv...

2003
Shiguang Ju Zhen Yang Chang-da Wang Dianchun Guo

The characteristics of grid are outlined to point out that the traditional authorization mechanisms cannot satisfy the requirement of the grid security. Then the authorization mechanisms employed in five prevalent Grid Security Architectures are compared in terms of granularity assessment, flexibility of rights control, and achievement approach. Based on these, we propose several approaches tha...

ژورنال: علوم آب و خاک 2012
محمدرضا مصدقی, , علی‌اکبر صفری سنجانی, , علی‌اکبر محبوبی, , محمدباقر فرهنگی, ,

In agriculture, cow manures are used to enhance soil fertility and productivity. Escherichia coli is the most common fecal coliform in cow manure and considered as an index for microbial contamination of groundwater resources. The objective of this study was to investigate the transport of Escherichia coli (released from cow manure) through the field soil. Lysimeters (with internal diameter of ...

2009
Martín Abadi Bruno Blanchet Hubert Comon-Lundh

This paper discusses progress in the verification of security protocols. Focusing on a small, classic example, it stresses the use of program-like representations of protocols, and their automatic analysis in symbolic and computational

1999
Nadia Kausar Bob Briscoe Jon Crowcroft

A chargeable session on the Internet may consist of more than one underlying chargeable service. Typically there will be two, one at the network layer and one at the session layer. Since different applications can have different demands from the Network, a generic charging scheme has to separate the service provided by the network from the service provided by an application/service provider. In...

Journal: :RFC 2009
Mohamad Badra Ibrahim Hajjeh

This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید