Sciweavers

2057 search results - page 122 / 412
» Distributed Secure Systems: Then and Now
Sort
View
IPPS
2000
IEEE
15 years 8 months ago
Network Survivability Simulation of a Commercially Deployed Dynamic Routing System Protocol
With the ever-increasing demands on server applications, many new server services are distributed in nature. We evaluated one hundred deployed systems and found that over a one-yea...
Abdur Chowdhury, Ophir Frieder, Paul Luse, Peng-Ju...
EUROPAR
2008
Springer
15 years 6 months ago
Complementarity between Virtualization and Single System Image Technologies
Nowadays, the use of clusters in research centers or industries is undeniable. Since few years, the usage of virtual machines (VM) offers more advanced resource management capabili...
Jérôme Gallard, Geoffroy Vallé...
CONCUR
2010
Springer
15 years 5 months ago
Session Types for Access and Information Flow Control
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both sessi...
Sara Capecchi, Ilaria Castellani, Mariangiola Deza...
CODASPY
2012
14 years 4 days ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
IPPS
2007
IEEE
15 years 10 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai