1.
|
After decades of deploying cyber-security systems, it is a well-known fact that theexisting cyber infrastructure has numerous inherent limitations that not only makethe m[...]
2020 | doctoral dissertations |
|
2.
|
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules inv[...]
2012 | doctoral dissertations |
|
3.
|
Social networking service is one of major technological phenomena on Web 2.0. Hundreds of millions of users are posting message, photos, and videos on their profiles and[...]
2011 | doctoral dissertations |
|
4.
|
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose[...]
2009 | doctoral dissertations |
|
5.
|
Wireless mesh networks (WMNs) have emerged to be a key wireless technology to support large-scale wireless Internet access. Seamless inter-gateway handoff support is an e[...]
2012 | doctoral dissertations |
|