Sciweavers

534 search results - page 44 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
IJNSEC
2007
139views more  IJNSEC 2007»
14 years 11 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
POLICY
2004
Springer
15 years 5 months ago
A Decentralized Treatment of a Highly Distributed Chinese-Wall Policy
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Naftaly H. Minsky
ESORICS
2007
Springer
15 years 6 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
NCA
2006
IEEE
15 years 5 months ago
A Distributed Architecture for Gracefully Degradable Web-Based Services
Modern Web sites provide multiple services that are often deployed through distributed architectures. The importance and the economic impact of Web-based services introduces signi...
Mauro Andreolini, Sara Casolari, Michele Colajanni
COMPUTER
2004
105views more  COMPUTER 2004»
14 years 11 months ago
SoftUDC: A Software-Based Data Center for Utility Computing
, abstracts each virtual machine's view of its storage and networks, and binds virtual machines across nodes into isolated virtual farms. The SoftUDC control system spans all ...
Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan,...