Guard (information security)
About: Guard (information security) is a(n) research topic. Over the lifetime, 12145 publication(s) have been published within this topic receiving 69213 citation(s). The topic is also known as: cross domain solution & cross-domain solution.
Papers published on a yearly basis
22 Jan 2001
Abstract: A system and method for maintaining security in a distributed computing environment comprises a policy manager located on a server for managing and distributing a security policy, and an application guard located on a client for managing access to securable components as specified by the security policy. In the preferred embodiment, a global policy specifies access privileges of the user to securable components. The policy manager may then preferably distribute a local client policy based on the global policy to the client. An application guard located on the client then manages access to the securable components as specified by the local policy.
Abstract: Using event history analysis, we found that CEOs and CFOs of firms filing a material financial restatement were more than twice as likely to exit their firms as their counterparts in a matched samp...
•26 Feb 1973
Abstract: A battery-powered grass trimmer with a novel one-piece support and split motor housing and blade guard construction, wherein the blade guard helps secure the motor housing in assembled relation and the assembled motor housing secures the one-piece support in position.
01 Jan 1999
Abstract: Why were papers rejected for publication? The study did not address an important scientific issue The study was not original (someone else had already done the same or a similar study) The study did not actually test the authors' hypothesis A different type of study should have been done Practical difficulties (in recruiting subjects, for example) led the authors to compromise on the original study protocol The sample size was too small The study was uncontrolled or inadequately controlled The statistical analysis was incorrect or inappropriate The authors drew unjustified conclusions from their data There is a significant conflict of interest (one of the authors, or a sponsor, might benefit financially from the publication of the paper and insufficient safeguards were seen to be in place to guard against bias) The paper is so badly written that it is incomprehensible
TL;DR: This paper introduces the concept of a guard zone, defined as the region around each receiver where interfering transmissions are inhibited, using stochastic geometry to derive the guard zone size that maximizes the transmission capacity for spread spectrum ad hoc networks.
Abstract: In ad hoc networks, it may be helpful to suppress transmissions by nodes around the desired receiver in order to increase the likelihood of successful communication. This paper introduces the concept of a guard zone, defined as the region around each receiver where interfering transmissions are inhibited. Using stochastic geometry, the guard zone size that maximizes the transmission capacity for spread spectrum ad hoc networks is derived - narrowband transmission (spreading gain of unity) is a special case. A large guard zone naturally decreases the interference, but at the cost of inefficient spatial reuse. The derived results provide insight into the design of contention resolution algorithms by quantifying the optimal tradeoff between interference and spatial reuse in terms of the system parameters. A capacity increase relative to random access (ALOHA) in the range of 2 - 100 fold is demonstrated through an optimal guard zone; the capacity increase depending primarily on the required outage probability, as higher required QoS increasingly rewards scheduling. Compared to the ubiquitous carrier sense multiple access (CSMA) which essentially implements a guard zone around the transmitter rather than the receiver - we observe a capacity increase on the order of 30 - 100%