Sciweavers

8493 search results - page 212 / 1699
» Implementing a distributed firewall
Sort
View
134
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
112
Voted
DSN
2004
IEEE
15 years 7 months ago
Secure Distributed DNS
A correctly working Domain Name System (DNS) is essential for the Internet. Due to its significance and because of deficiencies in its current design, the DNS is vulnerable to a w...
Christian Cachin, Asad Samar
132
Voted
ECTEL
2009
Springer
15 years 7 months ago
Remote Hands-On Experience: Distributed Collaboration with Augmented Reality
One claim of Technology-Enhanced Learning (TEL) is to support and exploit benefits from distance learning and remote collaboration. On the other hand, several approaches to learnin...
Matthias Krauß, Kai Riege, Marcus Winter, Ly...
139
Voted
WSC
2001
15 years 5 months ago
Security issues in high level architecture based distributed simulation
The United States Department of Defense (DoD) has, over the past several years, emphasized the need to employ simulation based acquisition (SBA) in engineering and development. Di...
Asa Elkins, Jeffery W. Wilson, Denis Gracanin
115
Voted
PDPTA
2000
15 years 5 months ago
Evaluating Multi user Distributed Action Games Architectures on a Corba Platform
The development of distributed applications is rapidly growing and some applications, like those which manipulate graphics, images and sounds, need special care. In this paper, we ...
Hendrik T. Macedo, Alessandro C. M. de Araú...