메뉴 건너뛰기




Volumn , Issue , 2004, Pages 386-395

PEACE: A policy-based establishment of ad-hoc communities

Author keywords

[No Author keywords available]

Indexed keywords

AD-HOC NETWORKS; COMPUTING DEVICES; NETWORK TOPOLOGY; SECURITY SERVICES;

EID: 21644442546     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2004.26     Document Type: Conference Paper
Times cited : (20)

References (36)
  • 4
    • 0027810202 scopus 로고
    • The process group approach to reliable distributed computing
    • K. P. Birman. The Process Group Approach to Reliable Distributed Computing. Communications of the ACM, 36(12):37-53, 1993.
    • (1993) Communications of the ACM , vol.36 , Issue.12 , pp. 37-53
    • Birman, K.P.1
  • 5
    • 84976814834 scopus 로고
    • Lightweight causal and atomic group multicast
    • K. P. Birman et al. Lightweight Causal and Atomic Group Multicast. ACM Trans. on Computer Systems, 9(3):272-314, 1991.
    • (1991) ACM Trans. on Computer Systems , vol.9 , Issue.3 , pp. 272-314
    • Birman, K.P.1
  • 6
    • 84987193155 scopus 로고
    • Exploiting virtual synchrony in distributed systems
    • K. P. Birman and T. A. Joseph. Exploiting Virtual Synchrony in Distributed Systems. ACM Operating Systems Review, 21(5):123-138, 1987
    • (1987) ACM Operating Systems Review , vol.21 , Issue.5 , pp. 123-138
    • Birman, K.P.1    Joseph, T.A.2
  • 7
    • 0034188591 scopus 로고    scopus 로고
    • Advances in network simulation
    • May
    • L. Breslau et al. Advances in Network Simulation. IEEE Computer, 33(5):59-67, May 2000.
    • (2000) IEEE Computer , vol.33 , Issue.5 , pp. 59-67
    • Breslau, L.1
  • 16
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Kluwer Academic Publishers
    • D. Johnson and D. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, volume 353. Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , vol.353
    • Johnson, D.1    Maltz, D.2
  • 17
    • 0031346670 scopus 로고    scopus 로고
    • Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
    • D. R. Kuhh. Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems. In Second ACM Workshop on Role-Based Access Control (RBAC 97), pages 23-30, 1997.
    • (1997) Second ACM Workshop on Role-based Access Control (RBAC 97) , pp. 23-30
    • Kuhh, D.R.1
  • 18
    • 3042742896 scopus 로고    scopus 로고
    • PICO: A middleware framework for pervasive computing
    • M. Kumar and B. A. Shirazi. PICO: A Middleware Framework for Pervasive Computing. IEEE Pervasive Computing, 2(3):72-79, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.3 , pp. 72-79
    • Kumar, M.1    Shirazi, B.A.2
  • 23
    • 0000788149 scopus 로고    scopus 로고
    • Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems
    • N. H. Minsky and V. Ungureanu. Law-Governed Interaction: A Coordination and Control Mechanism for Heterogeneous Distributed Systems. ACM Trans. on Software Engineering and Methodology, 9(3):273-305, 2000.
    • (2000) ACM Trans. on Software Engineering and Methodology , vol.9 , Issue.3 , pp. 273-305
    • Minsky, N.H.1    Ungureanu, V.2
  • 25
    • 0036738266 scopus 로고    scopus 로고
    • Spins: Security protocols for sensor networks
    • Sept.
    • A. Perrig et al. SPINS: Security Protocols for Sensor Networks. Wireless Networks, 8(5), Sept. 2002.
    • (2002) Wireless Networks , vol.8 , Issue.5
    • Perrig, A.1
  • 26
    • 0030130161 scopus 로고    scopus 로고
    • Horus: A flexible group communication system
    • V. Renesse et al. Horus: A Flexible Group Communication System. Communications of ACM, 39(4):76-83, 1996.
    • (1996) Communications of ACM , vol.39 , Issue.4 , pp. 76-83
    • Renesse, V.1
  • 27
    • 0003614529 scopus 로고    scopus 로고
    • SDSI - A simple distributed security infrastructure
    • R. L. Rivest and B. Lampson. SDSI - A Simple Distributed Security Infrastructure. CRYPTO'96, 1996.
    • (1996) CRYPTO'96
    • Rivest, R.L.1    Lampson, B.2
  • 28
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • R. Sandhu and E. Coyne. Role-Based Access Control Models. IEEE Computer, 29(8):38-47, 1996.
    • (1996) IEEE Computer , vol.29 , Issue.8 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2
  • 30
    • 21644476470 scopus 로고    scopus 로고
    • Secure virtual enclaves: Supporting coalition use of distributed application technologies
    • May
    • D. Shands et al. Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies. ACM Trans. on Information and System Security, 4(2), May 2001.
    • (2001) ACM Trans. on Information and System Security , vol.4 , Issue.2
    • Shands, D.1
  • 35
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad-hoc networks
    • November/December
    • L. Zhou and Z. J. Haas. Securing Ad-Hoc Networks. IEEE Network Magazine, 13(6), November/December 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.