-
1
-
-
33645793950
-
Implementation of a content-scanning module for an internet firewall
-
J. Moscola, J. Lockwood, R. P. Loui, and M. Pachos, "Implementation of a content-scanning module for an internet firewall, " in FieldProgrammable Custom Computing Machines, 2003. FCCM 2003. 11th Annual IEEE Symposium on. IEEE, 2003, pp. 31-38.
-
(2003)
FieldProgrammable Custom Computing Machines, 2003. FCCM 2003. 11th Annual IEEE Symposium on. IEEE
, pp. 31-38
-
-
Moscola, J.1
Lockwood, J.2
Loui, R.P.3
Pachos, M.4
-
2
-
-
78650573573
-
Cloud computing identity management
-
A. Gopalakrishnan, "Cloud computing identity management, " SETLabs briefings, vol. 7, no. 7, pp. 45-54, 2009.
-
(2009)
SETLabs Briefings
, vol.7
, Issue.7
, pp. 45-54
-
-
Gopalakrishnan, A.1
-
3
-
-
38949087920
-
Design and implementation of an xml firewall
-
nov.
-
Y-S. Loh, w.-c. Yau, c.-T. Wong, and w.-c. Ho, "Design and implementation of an xml firewall, " in Computational Intelligence and Security, 2006 International Coriference on, vol. 2, nov. 2006, pp. 1147-1150.
-
(2006)
Computational Intelligence and Security, 2006 International Coriference on
, vol.2
, pp. 1147-1150
-
-
Loh, Y.-S.1
Yau, W.-C.2
Wong, C.-T.3
Ho, W.-C.4
-
4
-
-
84899058008
-
Encrypted message authentication by firewalls
-
C. Gamage, J. Leiwo, and Y Zheng, "Encrypted message authentication by firewalls, " in Public Key Cryptography. Springer, 1999, pp. 634-634.
-
(1999)
Public Key Cryptography. Springer
, pp. 634-634
-
-
Gamage, C.1
Leiwo, J.2
Zheng, Y.3
-
5
-
-
78650746425
-
Virtualizing networking and security in the cloud
-
D. Basak, R. Toshniwal, S. Maskalik, and A. Sequeira, "Virtualizing networking and security in the cloud, " ACM STGOPS Operating Systems Review, vol. 44, no. 4, pp. 86-94, 2010.
-
(2010)
ACM STGOPS Operating Systems Review
, vol.44
, Issue.4
, pp. 86-94
-
-
Basak, D.1
Toshniwal, R.2
Maskalik, S.3
Sequeira, A.4
-
6
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. lakobsson, E. Shi, L. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control, " in Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 85-90.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security. ACM
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Lakobsson, M.3
Shi, E.4
Staddon, L.5
Masuoka, R.6
Molina, J.7
-
7
-
-
70450272524
-
VirtuaJ machine contracts for datacenter and cloud computing environments
-
J. Matthews, T. Garfinkel, C. Hoff, and J. Wheeler, "VirtuaJ machine contracts for datacenter and cloud computing environments, " in Proceedings of the J st workshop on Automated control for datacenters and clouds. ACM, 2009, pp. 25-30.
-
(2009)
Proceedings of the J St Workshop on Automated Control for Datacenters and Clouds. ACM
, pp. 25-30
-
-
Matthews, J.1
Garfinkel, T.2
Hoff, C.3
Wheeler, J.4
-
8
-
-
74049133176
-
Cloud security is not Gust) virtualization security: A short paper
-
M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni, "Cloud security is not Gust) virtualization security: a short paper, " in Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 97-102.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security. ACM
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
10
-
-
84865538933
-
A network in a laptop: Rapid prototyping for software-defined networks
-
B. Lantz, B. Heller, and N. McKeown, "A network in a laptop: rapid prototyping for software-defined networks, " in Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks. ACM, 201O, p. 19.
-
(2010)
Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks. ACM
, pp. 19
-
-
Lantz, B.1
Heller, B.2
McKeown, N.3
-
11
-
-
84980314899
-
The unsuccessful self-treatment of a case of writer's block
-
D. Upper, 'The unsuccessful self-treatment of a case of writer's block, " Journal of Applied Behavior Analysis, vol. 7, no. 3, p. 497, 1974.
-
(1974)
Journal of Applied Behavior Analysis
, vol.7
, Issue.3
, pp. 497
-
-
Upper, D.1
-
12
-
-
70249108888
-
Overbot: A botnet protocol based on kademlia
-
G. Starnberger, C. Kruegel, and E. Kirda, "Overbot: a botnet protocol based on kademlia, " in Proceedings of the 4th international conference on Security and privacy in communication netowrks. ACM, 2008, p. 13.
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. ACM
, pp. 13
-
-
Starnberger, G.1
Kruegel, C.2
Kirda, E.3
-
13
-
-
84947235017
-
Kademlia: A peer-to-peer information system based on the xor metric
-
P. Maymounkov and D. Mazieres, "Kademlia: A peer-to-peer information system based on the xor metric, " Peer-to-Peer Systems, pp. 53-65, 2002.
-
(2002)
Peer-to-Peer Systems
, pp. 53-65
-
-
Maymounkov, P.1
Mazieres, D.2
-
14
-
-
78650422387
-
Optimizing energy consumption of mobile nodes in heterogeneous kademlia-based distributed hash tables
-
I. Kelenyi and J. K. Nurminen, "Optimizing energy consumption of mobile nodes in heterogeneous kademlia-based distributed hash tables, " in Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST'08. T he Second International Conference on. IEEE, 2008, pp. 70-75.
-
(2008)
Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST'08. T He Second International Conference On. IEEE
, pp. 70-75
-
-
Kelenyi, I.1
Nurminen, J.K.2
|