Sciweavers

64 search results - page 11 / 13
» Using a virtual machine to protect sensitive Grid resources
Sort
View
PET
2004
Springer
13 years 11 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
PPOPP
2005
ACM
13 years 11 months ago
Trust but verify: monitoring remotely executing programs for progress and correctness
The increased popularity of grid systems and cycle sharing across organizations requires scalable systems that provide facilities to locate resources, to be fair in the use of tho...
Shuo Yang, Ali Raza Butt, Y. Charlie Hu, Samuel P....
ICWS
2007
IEEE
13 years 7 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
SACMAT
2010
ACM
13 years 4 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
USENIX
2000
13 years 7 months ago
Techniques for the Design of Java Operating Systems
Language-basedextensible systems, such as Java Virtual Machines and SPIN, use type safety to provide memory safety in a single address space. By using software to provide safety, ...
Godmar Back, Patrick Tullmann, Leigh Stoller, Wils...