Sciweavers

200 search results - page 1 / 40
» Replicating and Sharing Computer Security Laboratory Environ...
Sort
View
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
14 years 3 days ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...
STORAGESS
2005
ACM
13 years 11 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
LISA
1994
13 years 6 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
CGI
1999
IEEE
13 years 9 months ago
Virtual Laboratory: An Interactive Software Environment for Computer Graphics
Many activities in computer graphics can be regarded as experiments on virtual objects or models. In the process of experimentation the existing models are gradually improved and ...
Pavol Federl, Przemyslaw Prusinkiewicz
IJOE
2008
98views more  IJOE 2008»
13 years 5 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg