Sciweavers

739 search results - page 37 / 148
» Security Challenges in Cloud Computing
Sort
View
139
Voted
IEEECGIV
2005
IEEE
15 years 9 months ago
Combinations of Range Data and Panoramic Images - New Opportunities in 3D Scene Modeling
The paper informs about rotating line cameras (which capture images of several 100 Megapixel), their use for creating (stereo) panoramas, and how they can be used for texturing cl...
Reinhard Klette, Karsten Scheibe
CHI
2009
ACM
16 years 4 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
MIDDLEWARE
2009
Springer
15 years 10 months ago
Rhizoma: A Runtime for Self-deploying, Self-managing Overlays
Abstract. The trend towards cloud and utility computing infrastructures raises challenges not only for application development, but also for management: diverse resources, changing...
Qin Yin, Adrian Schüpbach, Justin Cappos, And...
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 9 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
ISW
2004
Springer
15 years 9 months ago
Universally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
Ke Xu, Stephen R. Tate