1.
After decades of deploying cyber-security systems, it is a well-known fact that theexisting cyber infrastructure has numerous inherent limitations that not only makethe m[...]
2020 | doctoral dissertations |
2.
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules inv[...]
2012 | doctoral dissertations |
3.
Social networking service is one of major technological phenomena on Web 2.0. Hundreds of millions of users are posting message, photos, and videos on their profiles and[...]
2011 | doctoral dissertations |
4.
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose[...]
2009 | doctoral dissertations |
5.
Wireless mesh networks (WMNs) have emerged to be a key wireless technology to support large-scale wireless Internet access. Seamless inter-gateway handoff support is an e[...]
2012 | doctoral dissertations |