Sciweavers

561 search results - page 82 / 113
» Remote Access Security Issues
Sort
View
GCC
2009
Springer
13 years 7 months ago
Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds
Current cloud computing infrastructure offerings are lacking in interoperability, which is a hindrance to the advancement and adoption of the cloud computing paradigm. As clouds ar...
Erik Elmroth, Lars Larsson
ACSAC
2010
IEEE
13 years 7 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
OZCHI
2006
ACM
14 years 3 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
SDMW
2004
Springer
14 years 3 months ago
Using Delay to Defend Against Database Extraction
For many data providers, the “crown jewels” of their business are the data that they have organized. If someone could copy their entire database, it would be a competitive cata...
Magesh Jayapandian, Brian D. Noble, James W. Micke...
CORR
2004
Springer
162views Education» more  CORR 2004»
13 years 9 months ago
Analysis of 802.11b MAC: A QoS, Fairness, and Performance Perspective
Wireless LANs have achieved a tremendous amount of growth in recent years. Among various wireless LAN technologies, the IEEE 802.11b based wireless LAN technology can be cited as ...
Srikant Sharma