Sciweavers

6844 search results - page 1336 / 1369
» Web Service Security
Sort
View
INFOCOM
2003
IEEE
14 years 2 months ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
LCR
1998
Springer
119views System Software» more  LCR 1998»
14 years 1 months ago
QoS Aspect Languages and Their Runtime Integration
Abstract. Distributedobject middleware, suchas CORBA, hides systemand network-speci c characteristics of objects behind functional interface speci cations. This simpli es developme...
Joseph P. Loyall, David E. Bakken, Richard E. Scha...
EUROSYS
2009
ACM
14 years 20 days ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
LISA
2007
13 years 11 months ago
Stork: Package Management for Distributed VM Environments
In virtual machine environments each application is often run in its own virtual machine (VM), isolating it from other applications running on the same physical machine. Contentio...
Justin Cappos, Scott M. Baker, Jeremy Plichta, Duy...
USENIX
2007
13 years 11 months ago
Reboots Are for Hardware: Challenges and Solutions to Updating an Operating System on the Fly
Patches to modern operating systems, including bug fixes and security updates, and the reboots and downtime they require, cause tremendous problems for system users and administr...
Andrew Baumann, Jonathan Appavoo, Robert W. Wisnie...
« Prev « First page 1336 / 1369 Last » Next »