Sciweavers

68 search results - page 12 / 14
» Management of Security Policies in Virtual Organisations
Sort
View
AIMS
2008
Springer
14 years 2 months ago
N2N: A Layer Two Peer-to-Peer VPN
The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by ...
Luca Deri, Richard Andrews
SACMAT
2010
ACM
13 years 6 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
ACSAC
2007
IEEE
14 years 2 months ago
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
Enriquillo Valdez, Reiner Sailer, Ronald Perez
CONCURRENCY
2008
119views more  CONCURRENCY 2008»
13 years 8 months ago
InterGrid: a case for internetworking islands of Grids
: Over the last few years, several nations around the world have set up Grids to share resources such as computers, data, and instruments to enable collaborative science, engineeri...
Marcos Dias de Assunção, Rajkumar Bu...
MOBISYS
2008
ACM
14 years 7 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...