Sciweavers

2422 search results - page 90 / 485
» Security Policy Consistency
Sort
View
POLICY
2007
Springer
15 years 10 months ago
Infrastructure-Aware Autonomic Manager for Change Management
Typical IT Environments of medium to large size organizations consist of tens of networks that connect hundreds of servers to support the running of a large variety of business-re...
Hady S. AbdelSalam, Kurt Maly, Ravi Mukkamala, Moh...
IEEEARES
2008
IEEE
15 years 11 months ago
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACL management suffer some problems that need to be addressed in order to...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Marti...
ADHOC
2008
132views more  ADHOC 2008»
15 years 4 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
SC
2005
ACM
15 years 10 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
GRID
2005
Springer
15 years 10 months ago
Bridging organizational network boundaries on the grid
— The Grid offers significant opportunities for performing wide area distributed computing, allowing multiple organizations to collaborate and build dynamic and flexible virtual ...
Jefferson Tan, David Abramson, Colin Enticott