Sciweavers

4312 search results - page 752 / 863
» Semi-User-Level Communication Architecture
Sort
View
IEEEARES
2006
IEEE
15 years 10 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
IPCCC
2006
IEEE
15 years 10 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
IPCCC
2006
IEEE
15 years 10 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
IPPS
2006
IEEE
15 years 10 months ago
Performance evaluation of wormhole routed network processor-memory interconnects
Network line cards are experiencing ever increasing line rates, random data bursts, and limited space. Hence, they are more vulnerable than other processormemory environments, to ...
Taskin Koçak, Jacob Engel
IPPS
2006
IEEE
15 years 10 months ago
Parallel implementation of the replica exchange molecular dynamics algorithm on Blue Gene/L
The Replica Exchange method is a popular approach for studying the folding thermodynamics of small to modest size proteins in explicit solvent, since it is easily parallelized. Ho...
Maria Eleftheriou, Aleksandr Rayshubskiy, Jed W. P...