Sciweavers

3712 search results - page 689 / 743
» Role-Based Access Control
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...
SIGCOMM
2009
ACM
14 years 2 months ago
Enhancing dynamic cloud-based services using network virtualization
It is envisaged that services and applications will migrate to a cloud-computing paradigm where thin-clients on userdevices access, over the network, applications hosted in data c...
Fang Hao, T. V. Lakshman, Sarit Mukherjee, Haoyu S...
SOUPS
2009
ACM
14 years 2 months ago
Balancing usability and security in a video CAPTCHA
We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person...
Kurt Alfred Kluever, Richard Zanibbi
VRCAI
2009
ACM
14 years 2 months ago
Towards Virtual Reality games
Game engines of cinematic quality, broadband networking and advances in Virtual Reality (VR) technologies are setting the stage to allow players to have shared, “better-than-lif...
Andrei Sherstyuk, Dale Vincent, Anton Treskunov
ACSAC
2008
IEEE
14 years 2 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...