Sciweavers

143 search results - page 14 / 29
» Design of a virtual computer security lab
Sort
View
WSC
2007
13 years 9 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
NETGAMES
2006
ACM
14 years 1 months ago
Peer clustering: a hybrid approach to distributed virtual environments
This paper proposes a hybrid architecture for distributed virtual environments, utilizing servers alongside peer-to-peer components. Current research into peer-based systems seeks...
Alvin Chen, Richard R. Muntz
SP
2005
IEEE
188views Security Privacy» more  SP 2005»
14 years 29 days ago
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
In this paper, we propose BIND (Binding Instructions aNd Data),1 a fine-grained attestation service for securing distributed systems. Code attestation has recently received consi...
Elaine Shi, Adrian Perrig, Leendert van Doorn
NCA
2006
IEEE
14 years 1 months ago
A Multipolicy Authorization Framework for Grid Security
A Grid system is a Virtual Organization that is composed of several autonomous domains. Authorization in such a system needs to be flexible and scalable to support multiple securi...
Bo Lang, Ian T. Foster, Frank Siebenlist, Rachana ...
SIGCOMM
2009
ACM
14 years 1 months ago
Accountability in hosted virtual networks
Virtualization enables multiple networks, each customized for a particular purpose, to run concurrently over a shared substrate. One such model for managing these virtual networks...
Eric Keller, Ruby B. Lee, Jennifer Rexford