Sciweavers

6195 search results - page 126 / 1239
» Cloud Computing Security
Sort
View
143
Voted
AISM
2004
15 years 5 months ago
Computer Security Research: Approaches and Assumptions
Researchers, no matter their field, are faced with the problem of selecting an appropriate approach before conducting a study. The purpose of this paper is to provide an overview ...
Christopher Bolan, Daniel Mende
CLOUD
2010
ACM
15 years 9 months ago
Differential virtual time (DVT): rethinking I/O service differentiation for virtual machines
This paper investigates what it entails to provide I/O service differentiation and performance isolation for virtual machines on individual multicore nodes in cloud platforms. Sh...
Mukil Kesavan, Ada Gavrilovska, Karsten Schwan
CCS
2010
ACM
15 years 4 months ago
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational models. It captures reasoning patterns that are common in p...
Gilles Barthe, Marion Daubignard, Bruce M. Kapron,...
ICCS
2005
Springer
15 years 9 months ago
Dynamic and Fine-Grained Authentication and Authorization Architecture for Grid Computing
The Globus Toolkit makes it very easy and comfortable for grid users to develop and deploy grid service. As for the security mechanism, however, only static authentication and coar...
Hyunjoon Jung, Hyuck Han, Hyungsoo Jung, Heon Youn...
154
Voted
ICICS
2010
Springer
15 years 2 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran