Sciweavers

449 search results - page 47 / 90
» Protecting the Hosted Application Server
Sort
View
TRIDENTCOM
2005
IEEE
14 years 1 months ago
Wireless Nomadic Transfer over Mobile Ad hoc Networks
Mobile ad hoc networking allows the development of several infrastructure free applications. One of the arguments we focused on is the possibility of deploying a set of services i...
Stefano Annese, Andrea Ghittino
FGCS
2002
138views more  FGCS 2002»
13 years 7 months ago
Armada: a parallel I/O framework for computational grids
High-performance computing increasingly occurs on "computational grids" composed of heterogeneous and geographically distributed systems of computers, networks, and stor...
Ron Oldfield, David Kotz
SAC
2009
ACM
14 years 2 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
USENIX
2004
13 years 9 months ago
C-JDBC: Flexible Database Clustering Middleware
Large web or e-commerce sites are frequently hosted on clusters. Successful open-source tools exist for clustering the front tiers of such sites (web servers and application serve...
Emmanuel Cecchet, Julie Marguerite, Willy Zwaenepo...
ICISS
2007
Springer
14 years 2 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...