The UNICORE grid infrastructure

M Romberg - Scientific programming, 2002 - content.iospress.com
Abstract UNICORE (Uniform Interface to Computer Resources) is a software infrastructure
supporting seamless and secure access to distributed resources. UNICORE allows uniform …

[引用][C] Firewalls And Internet Security: Repelling The Wily Hacker, 2/E

WR Cheswick - 2003 - Pearson Education India

The unicore architecture: Seamless access to distributed resources

M Romberg - … . The Eighth International Symposium on High …, 1999 - ieeexplore.ieee.org
Seamless access to different systems of different vendors at different sites is an important
prerequisite to effective and efficient use of distributed resources. Learning about new …

Digital signatures

SR Subramanya, BK Yi - IEEE Potentials, 2006 - ieeexplore.ieee.org
Many traditional and newer businesses and applications have recently been carrying out
enormous amounts of electronic transactions, which have led to a critical need for protecting …

Blockchain technology for trustworthy operations in the management of strategic grain reserves

A Iftekhar, X Cui, Y Yang - Foods, 2021 - mdpi.com
Food is a daily requirement for everyone, while production patterns are seasonal. Producing
sufficient nutrients is becoming more difficult because water and soil resources are already …

[PDF][PDF] A case study on E-Banking security–When security becomes too sophisticated for the user to access their information

AM French - Journal of Internet Banking and Commerce, 2012 - Citeseer
While eBanking security continues to increase in sophistication to protect against threats, the
usability of the eBanking decreases resulting in poor security behaviors by the users. The …

[图书][B] Laboratory information management systems

C Paszko, E Turner - 2018 - taylorfrancis.com
Details the most recent advances in Laboratory Information Management Systems. Offers
contemporary approaches to system development, design, and installation; system …

Trustworthy 100-year digital objects: Evidence after every witness is dead

HM Gladney - ACM Transactions on Information Systems (TOIS), 2004 - dl.acm.org
In ancient times, wax seals impressed with signet rings were affixed to documents as
evidence of their authenticity. A digital counterpart is a message authentication code fixed …

一种分层的网络安全评价方法

李敏, 费耀平 - 微机发展, 2003 - cqvip.com
一种分层的网络安全评价方法-[维普官方网站]-www.cqvip.com-维普网  我的维普 购物车 充值
客服 首页 | 期刊大全 | 文献分类 | 优先出版 | 论文检测 | 论文选题 | 在线分享 | 会议平台 | 学术机构 …

[图书][B] La comunicazione in rete: sicurezza, privacy, copyright in internet: soluzioni tecniche e giuridiche

M Morelli - 1999 - books.google.com
Lo sviluppo nel prossimo decennio-di molte delle applicazioni di Internet e delle reti che via
via sostituiranno quest'ultima-, prime fra tutte quelle che riguarderanno il commercio …