Sciweavers

110 search results - page 22 / 22
» NoHype: virtualized cloud infrastructure without the virtual...
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
13 years 4 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
DBKDA
2010
IEEE
127views Database» more  DBKDA 2010»
13 years 3 months ago
Failure-Tolerant Transaction Routing at Large Scale
—Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an AP...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
WWW
2004
ACM
14 years 5 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
IDTRUST
2009
ACM
14 years 1 days ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
INFOCOM
2008
IEEE
13 years 11 months ago
Turbo King: Framework for Large-Scale Internet Delay Measurements
—Distance estimation and topological proximity in the Internet have recently emerged as important problems for many distributed applications [1], [10], [11], [19], [29], [31], [4...
Derek Leonard, Dmitri Loguinov