[PDF][PDF] The CIA strikes back: Redefining confidentiality, integrity and availability in security.

S Samonas, D Coss - Journal of Information System Security, 2014 - proso.com
This paper reviews the history of the CIA (Confidentiality, Integrity and Availability) triad from
the perspectives of information security practitioners and scholars. Whilst the former have …

Single sign-on system for shared resource environments

PE Ghostine, M McDonald - US Patent 8,255,984, 2012 - Google Patents
Systems and methods for enhancing security of single sign on are described. These systems
and methods can reduce the amount of sensitive information stored on a client device while …

Identity migration apparatus and method

N Vanyukhin, O Shevnin, A Korotich - US Patent 8,346,908, 2013 - Google Patents
5.437, 555 5.440, 719 5,441,415 5,497,486 5, 497492 5.499. 379 5,530,829 5,550.968
5,550,976 5,553,291 5,586,304 5,590,360 5,600,833 5,608,874 5,608,903 5,613,090 …

Exploiting partial runtime reconfiguration for high-performance reconfigurable computing

E El-Araby, I Gonzalez, T El-Ghazawi - ACM Transactions on …, 2009 - dl.acm.org
Runtime Reconfiguration (RTR) has been traditionally utilized as a means for exploiting the
flexibility of High-Performance Reconfigurable Computers (HPRCs). However, the RTR …

Virtualizing and sharing reconfigurable resources in high-performance reconfigurable computing systems

E El-Araby, I Gonzalez… - 2008 Second International …, 2008 - ieeexplore.ieee.org
High-performance reconfigurable computers (HPRCs) are parallel computers but with
added FPGA chips. Examples of such systems are the Cray XT5 h and Cray XD1, the SRC-7 …

An integrated approach to federated identity and privilege management in open systems

R Bhatti, E Bertino, A Ghafoor - Communications of the ACM, 2007 - dl.acm.org
An integrated approach to federated identity and privilege management in open systems
Page 1 COMMUNICATIONS OF THE ACM February 2007/Vol. 50, No. 2 81 By Rafae Bhatti …

Apparatus, systems and methods to provide authentication services to a legacy application

JJ Bowers, MT Peterson - US Patent 7,904,949, 2011 - Google Patents
Authentication credentials from legacy applications are translated to Kerberos authentication
requests. Authentica tion credentials from the legacy application are directed to an …

Reconfigurable processing for satellite on-board automatic cloud cover assessment

E El-Araby, T El-Ghazawi, J Le Moigne… - Journal of Real-Time …, 2009 - Springer
Clouds have a critical role in many studies such as weather-and climate-related
investigations. However, they represent a source of errors in many applications, and the …

Disconnected credential validation using pre-fetched service tickets

MT Peterson, JM Webb - US Patent 8,087,075, 2011 - Google Patents
5,423,032 5,437,027 5,437,555 5,440,719 5,441,415 5,497,486 5,497,492 5,499,379
5,530,829 5,550,968 5,550,976 5,553,291 5,586,304 5,590,360 5,600,833 5,608,874 …

Identity migration apparatus and method

N Vanyukhin, O Shevnin, A Korotich - US Patent 8,086,710, 2011 - Google Patents
5, 497492 5.499. 379 5,530,829 5,550.968 5,550,976 5,553,291 5,586,304 5,590,360
5,600,833 5,608,874 5,608,903 5,623,601 5,630,069 5,630,131 5,659,735 5,659,736 …