Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Dartmouth Scholarship

2006

Security

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Scalability In A Secure Distributed Proof System, Kazuhiro Minami, David Kotz May 2006

Scalability In A Secure Distributed Proof System, Kazuhiro Minami, David Kotz

Dartmouth Scholarship

A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems dynamically. Those systems might define rules that refer to the users' context information to provide context-aware services. For example, a smart-home application could define rules referring to the location of a user to control the light of a house automatically. In general, the context information is maintained in different administrative domains, and it is, therefore, desirable to construct a proof in a distributed way while preserving each domain's confidentiality policies. In this paper, …


Channel Sampling Strategies For Monitoring Wireless Networks, Udayan Deshpande, Tristan Henderson, David Kotz Apr 2006

Channel Sampling Strategies For Monitoring Wireless Networks, Udayan Deshpande, Tristan Henderson, David Kotz

Dartmouth Scholarship

Monitoring the activity on an IEEE 802.11 network is useful for many applications, such as network management, optimizing deployment, or detecting network attacks. Deploying wireless sniffers to monitor every access point in an enterprise network, however, may be expensive or impractical. Moreover, some applications may require the deployment of multiple sniffers to monitor the numerous channels in an 802.11 network. In this paper, we explore sampling strategies for monitoring multiple channels in 802.11b/g networks. We describe a simple sampling strategy, where each channel is observed for an equal, predetermined length of time, and consider applications where such a strategy might …