Increasing Distributed IT&C Application Security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Contingency Logic and Security

In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...

متن کامل

Application of Grid Security to Personal Distributed Environments

As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile devices, however, have limits on their computational resources that make it difficult to achieve this goal. The Personal Distributed Environment (PDE) is a new concept in mobile networks which, by constraining the pro...

متن کامل

The ITC Distributed File System: Prototype and Experience

In this paper we describe a prototype of the ITC distributed file system, a design intended to span a network of thousands of workstations at Carnegie-Mellon University. Key features of the design are the use of whole file transfer and caching. The objective of the prototype is to evaluate the abilit_ of the high-level design to meet the the goals of location transparency, user mobility, and ap...

متن کامل

Increasing Security in Cloud Environment

The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at a very low cost. But with this new system comes the major concern of security, as the connection to t...

متن کامل

CORBA Firewall Security: Increasing the Security of CORBA Applications

Traditional network firewalls prevent unauthorised access and attacks by protecting the points of entry into the network. Currently, however, there is no standard mechanism by which a firewall identifies and controls the flow of Internet Inter-ORB Protocol (IIOP), that has become the de-facto standard interoperability protocol for Internet providing "out-of-the-box" interoperation with ORBs, an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Informatica Economica

سال: 2013

ISSN: 1453-1305,1842-8088

DOI: 10.12948/issn14531305/17.2.2013.13