Sciweavers

409 search results - page 30 / 82
» Flexible Scheduler-Independent Security
Sort
View
AISS
2010
165views more  AISS 2010»
14 years 9 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
HICSS
2002
IEEE
152views Biometrics» more  HICSS 2002»
15 years 4 months ago
Security Considerations for Distributed Web-Based E-commerce Applications in Java
Today’s distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an ...
Timothy E. Lindquist
AGENTS
1998
Springer
15 years 4 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
NSDI
2010
15 years 1 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
CSREASAM
2003
15 years 1 months ago
Developing Secure Web Services for Computational Portals
Computational web portals provide uniform access to remote computational resources--hardware, software, and data--by hiding the complexity of the heterogeneous, distributed, high ...
Choon-Han Youn, Marlon E. Pierce, Geoffrey Fox