Results 131 to 140 of about 38,187 (179)
Some of the next articles are maybe not open access.

Securing the Virtual State

Social Science Computer Review, 2006
Recent developments in U.S. privacy and security policy are traced, including coverage of the renewal of the PATRIOT Act, the domestic spying affair of 2005 to 2006, passage of the Real ID Act, and other developments associated with the Department of Homeland Security. Threats to democratic values are assessed.
openaire   +1 more source

Security: The Virtual Quest

Journal of Transnational Management Development, 2002
ABSTRACT Security and related contingency recovery plans ensure a business' survival when it is faced with potential information systems breakdowns. Its primary objective is to prevent a calamity from occurring and to limit the impact of destructive events related to computer-based information systems. Most disaster recovery plans, when put into effect,
Ata Nahouraii   +4 more
openaire   +1 more source

Secure Virtual Application Distribution

2009 International Conference on Computer Technology and Development, 2009
This paper describes about a framework for secure assignment of virtual application from server to client. The server is a gateway to many applications, which the client can utilize it by requesting the server through the client’s interface. The communication of this system is based on trust, where the Trusted Platform Module plays main role in ...
Wira Zanoramy A. Zakaria   +4 more
openaire   +1 more source

Virtualization Sparks Security Concerns

Computer, 2008
Virtualization is rapidly becoming a standard technology for businesses. The technology lets a single PC or server simultaneously run multiple operating systems or multiple sessions of a single OS. The approach is thus becoming a common way for users to optimize their hardware utilization by maximizing the number and kinds of jobs a single CPU can ...
openaire   +1 more source

Virtual underlying security

2003
La théorie des options réelles, qui permet d'évaluer des investissements ou encore de résoudre des problèmes de temps optimal d'investissement, est fondée sur l'existence d'un actif sous-jacent négocié pertinent. En l'absence d'un tel sous-jacent, il est possible de construire un portefeuille d'actifs négociés qui joue le rôle d'un sous-jacent virtuel (
Kast, A.   +3 more
openaire   +1 more source

Virtual Environment Security Modeling

2010
Virtualization allows to manage a lot of properties of computer systems including the security of information processing. Goal of this investigation is to state conditions of the ability of virtualization mechanism to guarantee satisfying of the security policy.
Dmitry Zegzhda, Ekaterina Rudina
openaire   +1 more source

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi   +2 more
exaly  

Virtual World Security

Paripex - Indian Journal Of Research, 2012
Vishal Bhogate   +3 more
openaire   +1 more source

Virtual machines, virtual security?

Communications of the ACM, 2006
openaire   +1 more source

Cloud Security and Virtualization

As organizations increasingly adopt cloud computing and virtualization technologies to enhance flexibility, scalability, and cost-efficiency, concerns about security have become paramount. This abstract explores the intersection of cloud security and virtualization, addressing the challenges and strategies for ensuring robust data protection in this ...
Su Panda, Priyanshu   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy