Sciweavers

859 search results - page 137 / 172
» Security for Key Management Interfaces
Sort
View
CCS
2003
ACM
14 years 3 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
CCGRID
2010
IEEE
13 years 11 months ago
Elastic Site: Using Clouds to Elastically Extend Site Resources
Infrastructure-as-a-Service (IaaS) cloud computing offers new possibilities to scientific communities. One of the most significant is the ability to elastically provision and relin...
Paul Marshall, Kate Keahey, Timothy Freeman
ICC
2007
IEEE
14 years 4 months ago
Reducing the Size of Rule Set in a Firewall
— A firewall’s complexity is known to increase with the size of its rule set. Complex firewalls are more likely to have configuration errors which cause security loopholes. ...
MyungKeun Yoon, Shigang Chen, Zhan Zhang
ISI
2007
Springer
14 years 4 months ago
On-Demand Information Portals for Disaster Situations
Abstract—This paper describes our work on developing technology for rapidly assembling information portals that provide integrated access to and analysis of information from mult...
Yiming Ma, Dmitri V. Kalashnikov, Ramaswamy Hariha...
CCGRID
2005
IEEE
14 years 3 months ago
Scaling NFSv4 with parallel file systems
Large grid installations require global access to massive data stores. Parallel file systems give high throughput within a LAN, but cross-site data transfers lack seamless integra...
Dean Hildebrand, Peter Honeyman