A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Integrating Web, Desktop, Enterprise and Military Simulation Technologies to Enable World-Wide Scalable Televirtual Environments
1999
Information & Security An International Journal
The atomicity, concurrency, security and other transactional capabilities of the database ensure consistency of the shared space. ...
Thus, the JWORB middleware acts as a universal software bus linking desktop/commodity visualization front-end with the DoD M&S backend. ...
doi:10.11610/isij.0311
fatcat:qp2nqloj7bge7d7h2vkawar52u
Leveraging cloud in the rapidly evolving workplace of the future
2011
2011 8th International Conference & Expo on Emerging Technologies for a Smarter World
In this paper we describe the implementation of a desktop cloud at IBM Research. ...
These workplaces bring many advantages over traditional self-managed environments, such as improved security and compliance, and rapid on-boarding. ...
We describe an approach and solution that securely extends the capabilities of desktop cloud computing to the appropriate segments of our enterprise user community. ...
doi:10.1109/cewit.2011.6135879
fatcat:lfhtew7ptzb6vh3sd3eajxpauq
Linux Services Vulnerabilities Assessment
2016
Arheologija i prirodne nauke
Kubuntu 11.04 x86 desktop
kubun1104dskx86
172.23.202.122
14.
Ubuntu 11.04 x64 desktop
ubunt1104dskx64
172.23.202.200
15.
Ubuntu 11.04 x86 desktop
ubunt1104dskx86
172.23.202.230
16. ...
Kubuntu 11.04 x86 desktop 172.23.202.122
4
12 6
22 7
23 9
39
14. Ubuntu 11.04 x64 desktop
172.23.202.200
4
12 6
22 7
23 9
39
15. ...
doi:10.18485/arhe_apn.2016.12.11
fatcat:5vanh3wmgjcuzdpcdxns7jacee
security constraints. ...
This could be particularly useful in enterprise contexts where running line-of-business applications on mobile devices can enhance enterprise operations. ...
enterprise; resource cloud = 10.0.0.50 none;
i) Can ECOS support enterprise applications with different latency, energy and security needs? ...
doi:10.1145/2396556.2396598
dblp:conf/ancs/GemberDA12
fatcat:4edqkscgmjhnlnnbcybxrhu56a
Application of Desktop Cloud in Processing of Petroleum Exploration Data
2017
DEStech Transactions on Social Science Education and Human Science
Through in-depth study of the desktop cloud and its application, we integrate several application systems, such as dedicated application system for petroleum exploration, information management systems ...
Through the desktop cloud, the user's thin client nearly does not require security control, and the desktop security is integrated into the computer room of data center to be managed and controlled by ...
Figure 5 . 5 Topological Graph of the Enterprise Desktop Cloud.
Figure 6 . 6 Diagram of Daily Drilling Progress. ...
doi:10.12783/dtssehs/emass2016/6810
fatcat:q7fzwtoglzgqjo73mhsunczhnu
Mobile Device Management
[chapter]
2012
A Comprehensive Guide to Enterprise Mobility
Using MDM in an enterprise solution such as the DISA DECC (much like Enterprise email) would centralize monitoring and security profile management. ...
and systems than desktops. ...
doi:10.1201/b12692-34
fatcat:qbkro725yndvxgi3wkpuvbftta
Policy Requirements to Ensure Security in Enterprise Grid Security Systems
2009
2009 2nd International Conference on Computer Science and its Applications
Hence, the security requirements for enterprise grid system are also unique. In this paper, we presented the unique security issues and security requirements encountered in enterprise grid systems. ...
We also devise appropriate security policies to address the enterprise grid security requirements. ...
Entropia[5] Entropia facilitates a Windows desktop grid system by aggregating the raw desktop resources into a single logical resource. ...
doi:10.1109/csa.2009.5404187
fatcat:3ynep6yfszdqflqgmzgfp63544
Design and Construction of the Virtual Cloud Platform for the Laboratory
2015
International Journal of Smart Home
Analyze the advantage and security of the cloud platform. ...
The whole desktop cloud solution is composed of the cloud terminal thinclient, virtual desktop controller OVD, virtual machine OVP, servers, storage equipment and so on, is realized the enterprise staff's ...
Desktop virtualization is the rapidly emerging trend as virtualization technology; more and more enterprises begin to accept the desktop virtualization technology to realize the enterprise desktop infrastructure ...
doi:10.14257/ijsh.2015.9.11.25
fatcat:5svxekdxgfckdii4qj4rdoxyr4
Implementation of Computational Grid Services in Enterprise Grid Environments
2008
American Journal of Applied Sciences
This study discusses the basics of enterprise grids and the implementation of enterprise computational grids using Alchemi Tool Kit. This review study is organized into three parts. ...
Thus windows based enterprise grid environments can't be neglected in the development of Global Grids. ...
DESIGN CONCEPTS OF ENTERPRISE GRIDS Enterprise or desktop grids are the grids implemented in an organization by connecting windows based desktop machines behind a single firewall without sacrificing security ...
doi:10.3844/ajassp.2008.1442.1447
fatcat:3o57stf77vg3nahcc3zlfvv5qi
Grid-enabling FIRST: Speeding Up Simulation Applications Using WinGrid
2006
2006 Tenth IEEE International Symposium on Distributed Simulation and Real-Time Applications
It is hoped that this would facilitate wider acceptance of WinGrid™ among enterprises having stringent security policies in place. ...
This can be contrasted with desktop-based grid computing which refers to the aggregation of nondedicated, de-centralized, commodity PCs connected through a network and running (mostly) the Microsoft Windows ...
In an enterprise desktop grid the worker usually runs in a "sandbox". ...
doi:10.1109/ds-rt.2006.19
dblp:conf/dsrt/MustafeeALTL06
fatcat:orp3imv6ezfungtq6zu4tlus5m
Issues in the Security Architecture of the Computerized Patient Record Enterprise
2005
Zenodo
We discuss issues in CPR enterprise security architecture. ...
The main goal is to provide a security environment where a user will be viewed the same across all enterprise systems, and access control decisions will be consistent across all components of the CPR enterprise ...
CPR Enterprise
Outside visitors have the potential for physical ac- Figure 1: CPR security issues space
cess to desktops and network ...
doi:10.5281/zenodo.3264150
fatcat:4n526irycfa67iui2z5xephb4q
Desktop Computer Virtualization for Improvement Security, Power Consumption and Cost by SBC (Server Based Computer)
2015
International Journal of Security and Its Applications
It is possible for virtualization of desktop to dramatically reduce maintenance costs and improve the security using various virtualization techniques rather than previous desktop environments. ...
Also, with blocking beforehand the information leakage caused by data centralization, it is easy to manage the information security. ...
Red Hat Enterprise Virtualization (RHEV) provides enterprise class open source server and desktop virtualization platforms. ...
doi:10.14257/ijsia.2015.9.5.15
fatcat:jmgyd644hfdgbg426inpo47g3y
ATG Special Report: Chromebook or Surface Pro for the Library Enterprise?
2014
Against the Grain
desktop. ...
Some shared disadvantages of both include:
• No remote desktop functionality;
including VPN or Remote Desktop. ...
doi:10.7771/2380-176x.6853
fatcat:4u2w54s5wjbhzaqamoxt6qbvny
Issues in the Security Architecture of the Computerized Patient Record Enterprise
2006
Zenodo
We discuss issues in CPR enterprise security architecture. ...
The main goal is to provide a security environment where a user will be viewed the same across all enterprise systems, and access control decisions will be consistent across all components of the CPR enterprise ...
Heavy-weight desktop
CPR enterprise
Interoperability of security services
Heavy security domains
Coarse-grain access control ...
doi:10.5281/zenodo.3264259
fatcat:l237xzxjbjh53fwuieycrhknle
Research and Development of the Thin Terminal Technology of Broadband Computer
2011
Computer and Information Science
With the increasingly expanding and perfecting of the construction and application of the information networking, the cost, technology, security, and management of the information networking are facing ...
technology of broadband computer is the information service system based on the C/S system computing platform, which could fully utilize the broadband network technology, with low cost, high efficiency, high security ...
J2EE can provide a platform-independent, transplantable, multi-user, secure, and standard-based enterprise-level platform for the Java technical development server to simplify the development, management ...
doi:10.5539/cis.v4n3p99
fatcat:ambin5dxtbc5dbcyz3ua4wx3d4
« Previous
Showing results 1 — 15 out of 20,364 results