20,364 Hits in 2.6 sec

Integrating Web, Desktop, Enterprise and Military Simulation Technologies to Enable World-Wide Scalable Televirtual Environments

G.C. Fox, W. Furmanski, B. Natarajan, H.T. Ozdemir, Odcikin Z. Ozdemir, S. Pallickara, T. Pulikal
1999 Information & Security An International Journal  
The atomicity, concurrency, security and other transactional capabilities of the database ensure consistency of the shared space.  ...  Thus, the JWORB middleware acts as a universal software bus linking desktop/commodity visualization front-end with the DoD M&S backend.  ... 
doi:10.11610/isij.0311 fatcat:qp2nqloj7bge7d7h2vkawar52u

Leveraging cloud in the rapidly evolving workplace of the future

T. Chefalas, J. Doran, L. M. Herger, A. Kochut, S. Mastrianni, C. Schulz, D. G. Shea
2011 2011 8th International Conference & Expo on Emerging Technologies for a Smarter World  
In this paper we describe the implementation of a desktop cloud at IBM Research.  ...  These workplaces bring many advantages over traditional self-managed environments, such as improved security and compliance, and rapid on-boarding.  ...  We describe an approach and solution that securely extends the capabilities of desktop cloud computing to the appropriate segments of our enterprise user community.  ... 
doi:10.1109/cewit.2011.6135879 fatcat:lfhtew7ptzb6vh3sd3eajxpauq

Linux Services Vulnerabilities Assessment

Vanja Korać, Milan Todorović, Dragan Prlja
2016 Arheologija i prirodne nauke  
Kubuntu 11.04 x86 desktop kubun1104dskx86 14. Ubuntu 11.04 x64 desktop ubunt1104dskx64 15. Ubuntu 11.04 x86 desktop ubunt1104dskx86 16.  ...  Kubuntu 11.04 x86 desktop 4 12 6 22 7 23 9 39 14. Ubuntu 11.04 x64 desktop 4 12 6 22 7 23 9 39 15.  ... 
doi:10.18485/arhe_apn.2016.12.11 fatcat:5vanh3wmgjcuzdpcdxns7jacee


Aaron Gember, Christopher Dragga, Aditya Akella
2012 Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems - ANCS '12  
security constraints.  ...  This could be particularly useful in enterprise contexts where running line-of-business applications on mobile devices can enhance enterprise operations.  ...  enterprise; resource cloud = none; i) Can ECOS support enterprise applications with different latency, energy and security needs?  ... 
doi:10.1145/2396556.2396598 dblp:conf/ancs/GemberDA12 fatcat:4edqkscgmjhnlnnbcybxrhu56a

Application of Desktop Cloud in Processing of Petroleum Exploration Data

Mei FENG, Jun-jun SUN, Liang CHEN, Guo-wei SHI, Wei LI
2017 DEStech Transactions on Social Science Education and Human Science  
Through in-depth study of the desktop cloud and its application, we integrate several application systems, such as dedicated application system for petroleum exploration, information management systems  ...  Through the desktop cloud, the user's thin client nearly does not require security control, and the desktop security is integrated into the computer room of data center to be managed and controlled by  ...  Figure 5 . 5 Topological Graph of the Enterprise Desktop Cloud. Figure 6 . 6 Diagram of Daily Drilling Progress.  ... 
doi:10.12783/dtssehs/emass2016/6810 fatcat:q7fzwtoglzgqjo73mhsunczhnu

Mobile Device Management [chapter]

2012 A Comprehensive Guide to Enterprise Mobility  
Using MDM in an enterprise solution such as the DISA DECC (much like Enterprise email) would centralize monitoring and security profile management.  ...  and systems than desktops.  ... 
doi:10.1201/b12692-34 fatcat:qbkro725yndvxgi3wkpuvbftta

Policy Requirements to Ensure Security in Enterprise Grid Security Systems

Syed Ishtiaque Ahmed, Mustafizur Rahman, Mukaddim Pathan
2009 2009 2nd International Conference on Computer Science and its Applications  
Hence, the security requirements for enterprise grid system are also unique. In this paper, we presented the unique security issues and security requirements encountered in enterprise grid systems.  ...  We also devise appropriate security policies to address the enterprise grid security requirements.  ...  Entropia[5] Entropia facilitates a Windows desktop grid system by aggregating the raw desktop resources into a single logical resource.  ... 
doi:10.1109/csa.2009.5404187 fatcat:3ynep6yfszdqflqgmzgfp63544

Design and Construction of the Virtual Cloud Platform for the Laboratory

Wang Kefeng, Ye Fei Yue
2015 International Journal of Smart Home  
Analyze the advantage and security of the cloud platform.  ...  The whole desktop cloud solution is composed of the cloud terminal thinclient, virtual desktop controller OVD, virtual machine OVP, servers, storage equipment and so on, is realized the enterprise staff's  ...  Desktop virtualization is the rapidly emerging trend as virtualization technology; more and more enterprises begin to accept the desktop virtualization technology to realize the enterprise desktop infrastructure  ... 
doi:10.14257/ijsh.2015.9.11.25 fatcat:5svxekdxgfckdii4qj4rdoxyr4

Implementation of Computational Grid Services in Enterprise Grid Environments

R.J.A. Richard, Ajay Anant Joshi, C. Eswaran
2008 American Journal of Applied Sciences  
This study discusses the basics of enterprise grids and the implementation of enterprise computational grids using Alchemi Tool Kit. This review study is organized into three parts.  ...  Thus windows based enterprise grid environments can't be neglected in the development of Global Grids.  ...  DESIGN CONCEPTS OF ENTERPRISE GRIDS Enterprise or desktop grids are the grids implemented in an organization by connecting windows based desktop machines behind a single firewall without sacrificing security  ... 
doi:10.3844/ajassp.2008.1442.1447 fatcat:3o57stf77vg3nahcc3zlfvv5qi

Grid-enabling FIRST: Speeding Up Simulation Applications Using WinGrid

Navonil Mustafee, Anders Alstad, Bjorn Larsen, Simon E Taylor, John Ladbrook
2006 2006 Tenth IEEE International Symposium on Distributed Simulation and Real-Time Applications  
It is hoped that this would facilitate wider acceptance of WinGrid™ among enterprises having stringent security policies in place.  ...  This can be contrasted with desktop-based grid computing which refers to the aggregation of nondedicated, de-centralized, commodity PCs connected through a network and running (mostly) the Microsoft Windows  ...  In an enterprise desktop grid the worker usually runs in a "sandbox".  ... 
doi:10.1109/ds-rt.2006.19 dblp:conf/dsrt/MustafeeALTL06 fatcat:orp3imv6ezfungtq6zu4tlus5m

Issues in the Security Architecture of the Computerized Patient Record Enterprise

Konstantin Beznosov
2005 Zenodo  
We discuss issues in CPR enterprise security architecture.  ...  The main goal is to provide a security environment where a user will be viewed the same across all enterprise systems, and access control decisions will be consistent across all components of the CPR enterprise  ...  CPR Enterprise  Outside visitors have the potential for physical ac- Figure 1: CPR security issues space cess to desktops and network  ... 
doi:10.5281/zenodo.3264150 fatcat:4n526irycfa67iui2z5xephb4q

Desktop Computer Virtualization for Improvement Security, Power Consumption and Cost by SBC (Server Based Computer)

Yong Hui Lee, Hwan Seok Kim, Baek Ki Kim
2015 International Journal of Security and Its Applications  
It is possible for virtualization of desktop to dramatically reduce maintenance costs and improve the security using various virtualization techniques rather than previous desktop environments.  ...  Also, with blocking beforehand the information leakage caused by data centralization, it is easy to manage the information security.  ...  Red Hat Enterprise Virtualization (RHEV) provides enterprise class open source server and desktop virtualization platforms.  ... 
doi:10.14257/ijsia.2015.9.5.15 fatcat:jmgyd644hfdgbg426inpo47g3y

ATG Special Report: Chromebook or Surface Pro for the Library Enterprise?

Mimmo Bonanni, Dennis Brunning
2014 Against the Grain  
desktop.  ...  Some shared disadvantages of both include: • No remote desktop functionality; including VPN or Remote Desktop.  ... 
doi:10.7771/2380-176x.6853 fatcat:4u2w54s5wjbhzaqamoxt6qbvny

Issues in the Security Architecture of the Computerized Patient Record Enterprise

Konstantin Beznosov
2006 Zenodo  
We discuss issues in CPR enterprise security architecture.  ...  The main goal is to provide a security environment where a user will be viewed the same across all enterprise systems, and access control decisions will be consistent across all components of the CPR enterprise  ...  Heavy-weight desktop CPR enterprise Interoperability of security services Heavy security domains Coarse-grain access control  ... 
doi:10.5281/zenodo.3264259 fatcat:l237xzxjbjh53fwuieycrhknle

Research and Development of the Thin Terminal Technology of Broadband Computer

Baoling Qin, Minwei Yang, Yao He
2011 Computer and Information Science  
With the increasingly expanding and perfecting of the construction and application of the information networking, the cost, technology, security, and management of the information networking are facing  ...  technology of broadband computer is the information service system based on the C/S system computing platform, which could fully utilize the broadband network technology, with low cost, high efficiency, high security  ...  J2EE can provide a platform-independent, transplantable, multi-user, secure, and standard-based enterprise-level platform for the Java technical development server to simplify the development, management  ... 
doi:10.5539/cis.v4n3p99 fatcat:ambin5dxtbc5dbcyz3ua4wx3d4
« Previous Showing results 1 — 15 out of 20,364 results