Sciweavers

64 search results - page 9 / 13
» Using a virtual machine to protect sensitive Grid resources
Sort
View
FGCS
2006
88views more  FGCS 2006»
13 years 7 months ago
Token based networking: Experiment NL-101
This short communication outlines an experiment where tokens, associated with application oriented IP streams, authorize access to an optical lightpath during iGrid 2005. The expe...
Leon Gommans, Bas van Oudenaarde, Alfred Wan, Cees...
DSN
2006
IEEE
14 years 1 months ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...
IPSN
2007
Springer
14 years 1 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
ACSAC
2001
IEEE
13 years 11 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
INTERNET
2007
105views more  INTERNET 2007»
13 years 7 months ago
Workflow Planning on a Grid
evel of abstraction, we can represent a workflow as a directed graph with operators (or tasks) at the vertices (see Figure 1). Each operator takes inputs from data sources or from ...
Craig W. Thompson, Wing Ning Li, Zhichun Xiao