Sciweavers

811 search results - page 47 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
LCN
2000
IEEE
15 years 9 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
RT
1999
Springer
15 years 9 months ago
Real-Time Rendering of Real World Environments
: One of the most important goals of interactive computer graphics is to allow a user to freely walk around a virtual recreation of a real environment that looks as real as the wor...
David K. McAllister, Lars S. Nyland, Voicu Popescu...
153
Voted
CHI
1999
ACM
15 years 9 months ago
Bridging Strategies for VR-Based Learning
A distributed immersive virtual environment was deployed as a component of a pedagogical strategy for teaching third grade children that the Earth is round. The displacement strat...
Thomas G. Moher, Andrew E. Johnson, Stellan Ohlsso...
GCC
2003
Springer
15 years 10 months ago
Secure Grid-Based Mobile Agent Platform by Instance-Oriented Delegation
An instance-oriented security mechanism is proposed to deal with security threats in building a general-purpose mobile agent middleware in Grid environment. The proposed solution i...
Tianchi Ma, Shanping Li
CCS
2008
ACM
15 years 6 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...