Sciweavers

24529 search results - page 159 / 4906
» Computing on Authenticated Data
Sort
View
HPCS
2005
IEEE
15 years 8 months ago
Comparison of Advanced Authorisation Infrastructures for Grid Computing
The widespread use of Grid technology and distributed compute power, with all its inherent benefits, will only be established if the use of that technology can be guaranteed effic...
A. J. Stell, Richard O. Sinnott, J. P. Watt
SC
2005
ACM
15 years 8 months ago
Massive High-Performance Global File Systems for Grid computing
In this paper we describe the evolution of Global File Systems from the concept of a few years ago, to a first demonstration using hardware Fibre Channel frame encoding into IP pa...
Phil Andrews, Patricia A. Kovatch, Chris Jordan
IEEEARES
2007
IEEE
15 years 9 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
CCS
2008
ACM
15 years 5 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
AICT
2006
IEEE
126views Communications» more  AICT 2006»
15 years 9 months ago
A Framework to Add AAA Functionalities in IP Multicast
Multicasting, as an operational paradigm, has not been widely adopted until now, in spite of the advantages of its lower resource utilization and bandwidth conservation. This is d...
Salekul Islam, J. William Atwood