Sciweavers

811 search results - page 47 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
LCN
2000
IEEE
14 years 1 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
RT
1999
Springer
14 years 1 months ago
Real-Time Rendering of Real World Environments
: One of the most important goals of interactive computer graphics is to allow a user to freely walk around a virtual recreation of a real environment that looks as real as the wor...
David K. McAllister, Lars S. Nyland, Voicu Popescu...
CHI
1999
ACM
14 years 1 months ago
Bridging Strategies for VR-Based Learning
A distributed immersive virtual environment was deployed as a component of a pedagogical strategy for teaching third grade children that the Earth is round. The displacement strat...
Thomas G. Moher, Andrew E. Johnson, Stellan Ohlsso...
GCC
2003
Springer
14 years 1 months ago
Secure Grid-Based Mobile Agent Platform by Instance-Oriented Delegation
An instance-oriented security mechanism is proposed to deal with security threats in building a general-purpose mobile agent middleware in Grid environment. The proposed solution i...
Tianchi Ma, Shanping Li
CCS
2008
ACM
13 years 10 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...