End-To-End Policy-Agnostic Security for Database-Backed Applications.
Jean YangTravis HanceThomas H. AustinArmando Solar-LezamaCormac FlanaganStephen ChongPublished in: CoRR (2015)
Keyphrases
- end to end
- database
- admission control
- multipath
- wireless ad hoc networks
- congestion control
- transport layer
- intrusion detection
- high bandwidth
- ad hoc networks
- scalable video
- rate allocation
- key management
- packet loss rate
- internet protocol
- content delivery
- service delivery
- multi hop
- video streams
- optimal policy
- access control
- wireless sensor networks
- computational complexity