Sciweavers

2560 search results - page 3 / 512
» Securing VO Management
Sort
View
CCS
2009
ACM
14 years 7 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
ATAL
2009
Springer
14 years 27 days ago
Virtual organization management eServices
This demonstration concentrates on eServices (supporting electronic services) for Virtual Organization (VO) management support. The eServices are provided by the VOM toolkit (a su...
Jirí Hodík, Jirí Vokrí...
GRID
2007
Springer
13 years 6 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...