Increasing Distributed IT&C Application Security
نویسندگان
چکیده
منابع مشابه
Distributed Contingency Logic and Security
In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...
متن کاملApplication of Grid Security to Personal Distributed Environments
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile devices, however, have limits on their computational resources that make it difficult to achieve this goal. The Personal Distributed Environment (PDE) is a new concept in mobile networks which, by constraining the pro...
متن کاملThe ITC Distributed File System: Prototype and Experience
In this paper we describe a prototype of the ITC distributed file system, a design intended to span a network of thousands of workstations at Carnegie-Mellon University. Key features of the design are the use of whole file transfer and caching. The objective of the prototype is to evaluate the abilit_ of the high-level design to meet the the goals of location transparency, user mobility, and ap...
متن کاملIncreasing Security in Cloud Environment
The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at a very low cost. But with this new system comes the major concern of security, as the connection to t...
متن کاملCORBA Firewall Security: Increasing the Security of CORBA Applications
Traditional network firewalls prevent unauthorised access and attacks by protecting the points of entry into the network. Currently, however, there is no standard mechanism by which a firewall identifies and controls the flow of Internet Inter-ORB Protocol (IIOP), that has become the de-facto standard interoperability protocol for Internet providing "out-of-the-box" interoperation with ORBs, an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatica Economica
سال: 2013
ISSN: 1453-1305,1842-8088
DOI: 10.12948/issn14531305/17.2.2013.13