Sciweavers

2281 search results - page 384 / 457
» Security Patterns and Secure Systems Design
Sort
View
123
Voted
HPDC
1998
IEEE
15 years 7 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
145
Voted
GCC
2006
Springer
15 years 7 months ago
Hierarchical Replica Location Service Based on Hybrid Overlay Platform
An important problem that confronts data grid applications is to efficiently locate the node that stores a particular data replica. This paper proposes a Hierarchical Replica Loca...
Jianjin Jiang, Guangwen Yang, Yongwei Wu, Wusheng ...
97
Voted
FECS
2006
103views Education» more  FECS 2006»
15 years 5 months ago
TMAS A Capstone Project
The College of Engineering and Computer Science at the University of Tennessee at Chattanooga (UTC) requires all undergraduate seniors to participate in a capstone project designe...
Joseph M. Kizza, Li Yang, Andy Novobilski, Kathy W...
174
Voted
ANSOFT
2002
171views more  ANSOFT 2002»
15 years 3 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
150
Voted
USS
2010
15 years 1 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp