Sciweavers

449 search results - page 52 / 90
» Protecting the Hosted Application Server
Sort
View
WETICE
1996
IEEE
14 years 16 hour ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
ICAC
2005
IEEE
14 years 1 months ago
Resource Allocation for Autonomic Data Centers using Analytic Performance Models
Large data centers host several application environments (AEs) that are subject to workloads whose intensity varies widely and unpredictably. Therefore, the servers of the data ce...
Mohamed N. Bennani, Daniel A. Menascé
CIS
2005
Springer
14 years 1 months ago
A Method for Automating the Extraction of Specialized Information from the Web
The World Wide Web can be viewed as a gigantic distributed database including millions of interconnected hosts some of which publish information via web servers or peer-to-peer sys...
Ling Lin, Antonio Liotta, Andrew Hippisley
ICC
2009
IEEE
246views Communications» more  ICC 2009»
14 years 2 months ago
Symmetric-Key Homomorphic Encryption for Encrypted Data Processing
—The difficulty of processing data in encrypted form has long been the barrier to the widespread use of encryption in data storage applications; improved security or privacy wou...
Aldar Chun-fai Chan
CN
2011
116views more  CN 2011»
13 years 2 months ago
WDA: A Web farm Distributed Denial Of Service attack attenuator
Distributed Denial Of Service (DDoS) attacks are familiar threats to Internet users for more than ten years. Such attacks are carried out by a “Bot net”, an army of zombie hos...
Ehud Doron, Avishai Wool