Sciweavers

151 search results - page 19 / 31
» Unifying File System Protection
Sort
View
100
Voted
BMCBI
2007
123views more  BMCBI 2007»
15 years 2 months ago
BIRCH: A user-oriented, locally-customizable, bioinformatics system
Background: Molecular biologists need sophisticated analytical tools which often demand extensive computational resources. While finding, installing, and using these tools can be ...
Brian Fristensky
CHI
2009
ACM
16 years 2 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
137
Voted
IEEEIAS
2009
IEEE
15 years 19 hour ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
DATE
2010
IEEE
160views Hardware» more  DATE 2010»
15 years 7 months ago
IVF: Characterizing the vulnerability of microprocessor structures to intermittent faults
—With the advancement of CMOS manufacturing process to nano-scale, future shipped microprocessors will be increasingly vulnerable to intermittent faults. Quantitatively character...
Songjun Pan, Yu Hu, Xiaowei Li
134
Voted
CLUSTER
2001
IEEE
15 years 6 months ago
SOVIA: A User-level Sockets Layer Over Virtual Interface Architecture
The Virtual Interface Architecture (VIA) is an industry standard user-level communication architecture for system area networks. The VIA provides a protected, directlyaccessible i...
Jin-Soo Kim, Kangho Kim, Sung-In Jung