Sciweavers

802 search results - page 108 / 161
» Security Policy Reconciliation in Distributed Computing Envi...
Sort
View
NSDI
2007
15 years 4 months ago
Tesseract: A 4D Network Control Plane
We present Tesseract, an experimental system that enables the direct control of a computer network that is under a single administrative domain. Tesseract’s design is based on t...
Hong Yan, David A. Maltz, T. S. Eugene Ng, Hemant ...
SOSP
2005
ACM
15 years 10 months ago
THINC: a virtual display architecture for thin-client computing
Rapid improvements in network bandwidth, cost, and ubiquity combined with the security hazards and high total cost of ownership of personal computers have created a growing market...
Ricardo A. Baratto, Leonard N. Kim, Jason Nieh
SAC
2004
ACM
15 years 7 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
IJAMC
2010
149views more  IJAMC 2010»
15 years 2 days ago
Deadline-Driven Auctions for NPC host allocation in P2P MMOGs
: This paper presents the design, implementation and evaluation of Deadline-Driven Auctions (DDA), a novel task mapping infrastructure for heterogeneous distributed environments. D...
Lu Fan, Philip W. Trinder, Hamish Taylor
ACSAC
2007
IEEE
15 years 8 months ago
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
Enriquillo Valdez, Reiner Sailer, Ronald Perez