• Nenhum resultado encontrado

[PDF] Top 20 Flexible And Secure Access To Computing Clusters

Has 10000 "Flexible And Secure Access To Computing Clusters" found on our website. Below are the top 20 most common "Flexible And Secure Access To Computing Clusters".

Flexible And Secure Access To Computing Clusters

Flexible And Secure Access To Computing Clusters

... schema to be used by various, unmodified ...session and password ...restricting access to the system but not on the basis of ...used to perform some actions prior to granting ... See full document

16

Effective Ways of Secure Private and Trusted Cloud Computing

Effective Ways of Secure Private and Trusted Cloud Computing

... fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible ...more and more information on individuals and companies is placed in ... See full document

10

Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs

Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs

... technology and security stakeholders like CIOs, CISOs and CTOs in financial services organization are often asked to identify the risks with mobile computing channel for financial services ... See full document

8

Secure authentication mechanisms for the management interface in cloud computing environments

Secure authentication mechanisms for the management interface in cloud computing environments

... cloud computing came the massive use of SaaS ...user to access multiple applications by simply authenticating once on a centralized and online service, whose owning entity takes the role of an ... See full document

125

Review of Access Control Models for Cloud Computing

Review of Access Control Models for Cloud Computing

... for access control models in cloud computing environments: (1) Develop attribute-driven role-based access control models such that the user- role and role-permission assignments be separately ... See full document

9

Research, Implementations and Issues on Cloud Computing

Research, Implementations and Issues on Cloud Computing

... “Virtual Computing Laboratory (VCL)- ...a secure production-level on-demand utility computing and services oriented technology or wide-area accessto solutions based on virtualized resources, ... See full document

7

Secure and efficient storage of multimedia: content in public cloud environments using joint compression and encryption

Secure and efficient storage of multimedia: content in public cloud environments using joint compression and encryption

... Cloud Computing appears much later when the CEO of Google, Eric Schmidt, at a conference in 2006 on "Strategies Search Engines", invokes it, indicating that Google will call its new business model Cloud ... See full document

125

 Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

... cloud computing it can be implemented to give security for public ...key and another is condition ...given to the proxy for partial re-encryption and the other key can be given ... See full document

5

A flexible framework for Rogue Access Point detection

A flexible framework for Rogue Access Point detection

... Protected Access (WPA) (developed using IEEE 802.1X) was meant to be an access control method for network ...accesses to the network ...wants to connect to the network), the ... See full document

75

Identity Management and Authorization Infrastructure in Secure Mobile Access to Electronic Health Records

Identity Management and Authorization Infrastructure in Secure Mobile Access to Electronic Health Records

... for access control are based on predefined access policies and roles and are inflexible because the access control policy is hard-coded and pre-set into decision logic or ... See full document

142

The Impact of E-Commerce Securi ty, and National Environment  on Consumer adoption of Intern et Banking in Malaysia and  Singapore

The Impact of E-Commerce Securi ty, and National Environment on Consumer adoption of Intern et Banking in Malaysia and Singapore

... experience and banking need is defined as the degree to which an innovation is viewed as being consistent with the existing values, needs and experiences of a user (Rogers, 1983; Taylor & Todd, ... See full document

20

Game theory for multi-access edge computing: survey, use cases, and future trends

Game theory for multi-access edge computing: survey, use cases, and future trends

... generality and flexibility when applied in a wide diversity of scenarios in wireless networks ...generations and through a process of genetic inheritance constrained by mutation, crossover and ... See full document

40

Cloud Storage and its Secure Overlay Techniques

Cloud Storage and its Secure Overlay Techniques

... space to hold all the data they've acquired is a real ...order to make space for new information. But some are choosing to rely on a growing trend: cloud ...information to computer's hard ... See full document

5

Configurable multiplier modules for an adaptive computing system

Configurable multiplier modules for an adaptive computing system

... adapt to changing accuracy requirements easily and ...help to improve the embedding of multiplier architectures in the surroundings of the 3-D-SoftChip ...Pf¨ander and Pfleiderer (2004), we ... See full document

6

Experiences with distributed computing for meteorological applications: grid computing and cloud computing

Experiences with distributed computing for meteorological applications: grid computing and cloud computing

... advantages and disad- vantages of grid and cloud concepts, which affected our re- search most (see Table 1 for a brief ...Mell and Grance (2011), Hamdaqa and Tahvildari (2012) and Fos- ... See full document

12

Access to medicines

Access to medicines

... Vaccines, and Health Technology Unit, within the Area of Technology and Health Services Delivery (THS/EV), under the Office of the Assistant Director, promotes, coordinates, and implements technical ... See full document

7

Determinants and Consequences of   the Website Perceived Value

Determinants and Consequences of the Website Perceived Value

... (Holbrook and Coffman, ...shopper to realize some of his purposes_ or extrinsic when the experience is enjoyed for its own sake (Babin and Darden, 1995; Batra and Ahtola, ...responds to ... See full document

13

Using routine surveillance data to estimate the epidemic potential of emerging zoonoses: application to the emergence of US swine origin influenza A H3N2v virus.

Using routine surveillance data to estimate the epidemic potential of emerging zoonoses: application to the emergence of US swine origin influenza A H3N2v virus.

... Bias and Precision If the detection rate r is known, it is always possible to invert the relationship shown in Figure 2 to derive an unbiased estimator of ...unknown and that we plan to ... See full document

11

Access And Monitoring WLAN Using Mobile Application

Access And Monitoring WLAN Using Mobile Application

... controlling and monitoring LAN through Cell phone. Access and monitoring WLAN Using Mobile application is implemented by using android based platform ...machine and then server can controlled ... See full document

4

Chemical Approaches to Ubiquitous Computing

Chemical Approaches to Ubiquitous Computing

... p(TMC) and lithium perchlorate in acetonitrile (Aldrich, anhydrous ...components and lithium salt for a period of at least 48 h within a dry argon-filled preparative glove ...polymer and salt ... See full document

245

Show all 10000 documents...