Sciweavers

2187 search results - page 351 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 9 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
SRDS
2010
IEEE
13 years 7 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
14 years 2 months ago
Information in Health Care Process - Evaluation Toolkit Development
Increasing health care costs put a great strain on national economies. In recent years there have been several national and regional research and development projects in Finland a...
Heidi Häkkinen, Pekka Turunen, Ton A. M. Spil
CCS
2003
ACM
14 years 2 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
STORAGESS
2006
ACM
14 years 3 months ago
Using free web storage for data backup
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to e...
Avishay Traeger, Nikolai Joukov, Josef Sipek, Erez...