Sciweavers

122 search results - page 18 / 25
» Designing NFS with RDMA for Security, Performance and Scalab...
Sort
View
CCS
2004
ACM
14 years 1 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
IROS
2006
IEEE
140views Robotics» more  IROS 2006»
14 years 1 months ago
Developing a non-intrusive biometric environment
— The development of large scale biometric systems requires experiments to be performed on large amounts of data. Existing capture systems are designed for fixed experiments and...
Lee Middleton, David K. Wagg, Alex I. Bazin, John ...
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 8 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
SIGSOFT
2010
ACM
13 years 5 months ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf