Sciweavers

1573 search results - page 207 / 315
» Strong User Authentication
Sort
View
ESCIENCE
2006
IEEE
15 years 5 months ago
Authorizing Remote Job Execution Based on Job Properties
: E-Science often requires access to remote Grid computing platforms. Current authorization systems on these remote systems have largely based decisions solely on the identity of t...
Sang-Min Park, Glenn S. Wasson, Marty Humphrey
GCC
2006
Springer
15 years 5 months ago
Hierarchical Replica Location Service Based on Hybrid Overlay Platform
An important problem that confronts data grid applications is to efficiently locate the node that stores a particular data replica. This paper proposes a Hierarchical Replica Loca...
Jianjin Jiang, Guangwen Yang, Yongwei Wu, Wusheng ...
LISA
2007
15 years 4 months ago
RepuScore: Collaborative Reputation Management Framework for Email Infrastructure
We propose RepuScore, a collaborative reputation management framework over email infrastrucure, which allows participating organizations to establish sender accountability on the ...
Gautam Singaraju, Brent ByungHoon Kang
LISA
2007
15 years 4 months ago
Usher: An Extensible Framework for Managing Clusters of Virtual Machines
Usher is a virtual machine management system designed to impose few constraints upon the computing environment under its management. Usher enables administrators to choose how the...
Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffre...
CCS
2008
ACM
15 years 3 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...