Sciweavers

231 search results - page 33 / 47
» Authentication across heterogeneous networks
Sort
View
MMS
2002
14 years 9 months ago
Architectural considerations for next-generation file systems
Integration--supporting multiple application classes with heterogeneous requirements--is an emerging trend in networks, file systems, and operating systems. In this paper, we eval...
Prashant J. Shenoy, Pawan Goyal, Harrick M. Vin
SRDS
2010
IEEE
14 years 7 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
69
Voted
NGC
2001
Springer
116views Communications» more  NGC 2001»
15 years 2 months ago
Scalable IP Multicast Sender Access Control for Bi-directional Trees
Bi-directional shared tree is an efficient routing scheme for interactive multicast applications with multiple sources. Given the open-group IP multicast service model, it is impor...
Ning Wang, George Pavlou
CCS
2008
ACM
14 years 11 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
ICEB
2004
297views Business» more  ICEB 2004»
14 years 11 months ago
Security Measures in Mobile Commerce: Problems and Solutions
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
Sanwar Ali, Waleed Farag, Mohammad A. Rob