Sciweavers

2178 search results - page 96 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CCS
2008
ACM
13 years 11 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
ICSE
1995
IEEE-ACM
14 years 19 days ago
Architectural Mismatch or Why It's Hard to Build Systems Out Of Existing Parts
Many would argue that future breakthroughs in software productivity will dependon our ability to combine existing pieces of software to produce new applications. An important step...
David Garlan, Robert Allen, John Ockerbloom
JPDC
2008
134views more  JPDC 2008»
13 years 9 months ago
Analyzing the performance of a cluster-based architecture for immersive visualization systems
Cluster computing has become an essential issue for designing immersive visualization systems. This paradigm employs scalable clusters of commodity computers with much lower costs...
Pedro Morillo, Aron Bierbaum, Patrick Hartling, Ma...
CORR
2008
Springer
104views Education» more  CORR 2008»
13 years 9 months ago
Interoperability between Heterogeneous Federation Architectures: Illustration with SAML and WS-Federation
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architec...
Mikaël Ates, Christophe Gravier, Jér&e...
VLSID
2008
IEEE
142views VLSI» more  VLSID 2008»
14 years 3 months ago
Incorporating PVT Variations in System-Level Power Exploration of On-Chip Communication Architectures
With the shift towards deep sub-micron (DSM) technologies, the increase in leakage power and the adoption of poweraware design methodologies have resulted in potentially significa...
Sudeep Pasricha, Young-Hwan Park, Fadi J. Kurdahi,...