Sciweavers

1770 search results - page 169 / 354
» Writing requirements in computer security
Sort
View
74
Voted
NCA
2007
IEEE
15 years 4 months ago
Transparent Reliable Multicast for Ethernet-Based Storage Area Networks
As disk storage density increases and data availability requirements become ever more demanding, data replication is increasingly an indispensable feature of enterprise-class stor...
Shibiao Lin, Maohua Lu, Tzi-cker Chiueh
84
Voted
EUROPAR
2009
Springer
15 years 2 months ago
SSD-HDD-Hybrid Virtual Disk in Consolidated Environments
Abstract. With the prevalence of multi-core processors and cloud computing, the server consolidation using virtualization has increasingly expanded its territory, and the degree of...
Heeseung Jo, Youngjin Kwon, Hwanju Kim, Euiseong S...
SCIENTOMETRICS
2011
14 years 5 months ago
Rejection rates for multiple-part manuscripts
Multiple-part manuscripts are those submitted to a journal and intended for publication as a series, usually having ‘‘Part 1,’’ ‘‘Part I,’’ … ‘‘Part N’’ i...
David M. Schultz
80
Voted
WWW
2007
ACM
15 years 11 months ago
Defeating script injection attacks with browser-enforced embedded policies
Web sites that accept and display content such as wiki articles or comments typically filter the content to prevent injected script code from running in browsers that view the sit...
Trevor Jim, Nikhil Swamy, Michael Hicks
79
Voted
CCS
2008
ACM
15 years 7 days ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud