Sciweavers

1000 search results - page 23 / 200
» Application Access Control at Network Level
Sort
View
FAST
2003
13 years 9 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
NGC
2001
Springer
116views Communications» more  NGC 2001»
13 years 12 months ago
Scalable IP Multicast Sender Access Control for Bi-directional Trees
Bi-directional shared tree is an efficient routing scheme for interactive multicast applications with multiple sources. Given the open-group IP multicast service model, it is impor...
Ning Wang, George Pavlou
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 4 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
ACSAC
2000
IEEE
13 years 12 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
ICDCSW
2003
IEEE
14 years 24 days ago
Using Service Brokers for Accessing Backend Servers for Web Applications
— Current Web servers use various API sets to access backend services. This model does not support service differentiation, overload control, caching of contents generated by bac...
Huamin Chen, Prasant Mohapatra