Sciweavers

988 search results - page 119 / 198
» Cryptographic access control in a distributed file system
Sort
View
CSREASAM
2009
15 years 28 days ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov
HCW
2000
IEEE
15 years 4 months ago
Reliable Cluster Computing with a New Checkpointing RAID-x Architecture
In a serverless cluster of PCs or workstations, the cluster must allow remote file accesses or parallel I/O directly performed over disks distributed to all client nodes. We intro...
Kai Hwang, Hai Jin, Roy S. C. Ho, Wonwoo Ro
MSS
1999
IEEE
137views Hardware» more  MSS 1999»
15 years 4 months ago
Overview of a TRW Pilot Program
Recently TRW fielded a prototype system for a government customer. It provides a wide range of capabilities including data collection, hierarchical storage, automated distribution...
William A. Olsen
JODI
2010
115views more  JODI 2010»
14 years 6 months ago
ICE-Theorem - End to end semantically aware eResearch infrastructure for theses
: ICE-TheOREM was a project which made several important contributions to the repository domain, promoting deposit by integrating the repository with authoring workflows and enhanc...
Peter Sefton, Jim Downing
NSPW
2006
ACM
15 years 5 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop