Sciweavers

6195 search results - page 125 / 1239
» Cloud Computing Security
Sort
View
148
Voted
FCS
2006
15 years 5 months ago
Cryptographic and Computational Challenges in Grid Computing
A computational grid is a large-scale distributed computing environment capable of providing dependable, consistent, pervasive, and inexpensive access to high-end computational re...
Song Y. Yan, Glyn James, Gongyi Wu
SIGOPS
2010
83views more  SIGOPS 2010»
15 years 2 months ago
Cloudifying source code repositories: how much does it cost?
—Cloud computing provides us with general purpose storage and server hosting platforms at a reasonable price. We explore the possibility of tapping these resources for the purpos...
Michael Siegenthaler, Hakim Weatherspoon
COMPSEC
2006
143views more  COMPSEC 2006»
15 years 4 months ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu
PDCAT
2005
Springer
15 years 9 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
MOC
2010
14 years 10 months ago
Computing matrix representations
Let G be a ...nite group and be a faithful irreducible character for G. Earlier papers by the ...rst author describe techniques for computing a matrix representation for G which a
Vahid Dabbaghian, John D. Dixon