Network Policy Server

Results: 104



#Item
1Computing / Data management / Computer performance / Cloud storage / Energy proportional computing / Storage area network / Replication / Server / Data center / Blinking / Solid-state drive / Standard Performance Evaluation Corporation

Towards Continuous Policy-driven Demand Response in Data Centers David Irwin, Navin Sharma, and Prashant Shenoy University of Massachusetts, Amherst {irwin,nksharma,shenoy}@cs.umass.edu

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2014-08-13 10:32:45
2Computer network security / Cybercrime / Computer security / Cryptography / Cyberwarfare / National security / Password / Email / Mobile computing / Internet / Server / Greek Orthodox Archdiocese of America

General Policy and Procedure on Technology Prepared by the Office of Information Technology AprilAdopted by Administrative Council June 7, 2010)

Add to Reading List

Source URL: www.arch-no.org

Language: English - Date: 2014-06-19 13:44:40
3Computing / Internet / Internet privacy / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / Network performance / Proxy server / HTTP cookie / Transport Layer Security / Email

REEF FAMILY OF COMPANIES WEBSITE PRIVACY POLICY Visitors to the Reef Family of Companies website are not required to provide any personal information. However, to use certain features on this site, you may be asked to pr

Add to Reading List

Source URL: reefogc.com

Language: English - Date: 2010-08-20 15:18:56
4Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Hardware security module / Name server / DS / Domain name system / Internet / Internet protocols

DNSSEC_Policy_nic.at_v1.0_2012

Add to Reading List

Source URL: www.nic.at

Language: English - Date: 2012-02-27 09:48:43
5Concurrent computing / Distributed data storage / Distributed computing architecture / Routing / Peer-to-peer / Coda / Consistency model / Client–server model / Computing / Network file systems / Computer architecture

PADS: A Policy Architecture for Distributed Storage Systems Nalini Belaramani∗ , Jiandan Zheng§ , Amol Nayate† , Robert Soul´e‡ , Mike Dahlin∗ , Robert Grimm‡ ∗ The § Amazon.com

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2009-03-05 14:09:49
6Data management / Computer security / Data security / Security / Information security / National security / Data center / Server / File area network / Computing / Concurrent computing / Distributed computing

Microsoft Word - Server Consolidation Policy

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2015-01-29 14:37:28
7Computer network security / Scripting languages / Web development / Cross-site scripting / JavaScript / Same origin policy / Web server / Computing / World Wide Web / Computer security

SOMA: Mutual Approval for Included Content On Web Pages Terri Oda, Glenn Wurster, P. C. van Oorschot, Anil Somayaji

Add to Reading List

Source URL: terri.zone12.com

Language: English - Date: 2008-11-05 16:24:05
8HTTP / Scripting languages / Cross-site scripting / Cross-site request forgery / JavaScript / HTTP cookie / Same origin policy / World Wide Web / Web server / Software / Computing / Computer network security

SOMA: Mutual Approval for Included Content in Web Pages Terri Oda Glenn Wurster P. C. van Oorschot Anil Somayaji Carleton Computer Security Lab School of Computer Science Carleton University, Canada

Add to Reading List

Source URL: terri.zone12.com

Language: English - Date: 2008-11-02 21:28:43
9World Wide Web / Scripting languages / Software architecture / Web 2.0 / Cross-platform software / JavaScript / Mashup / HTTP cookie / Same origin policy / Computing / Computer network security / Software engineering

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D4.1

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2011-10-25 10:27:30
10Computer security / Internet / Cross-platform software / JavaScript / HTTP cookie / Same origin policy / World Wide Web / Proxy server / Proxy auto-config / Computing / Internet privacy / Computer network security

Architectures for Inlining Security Monitors in Web Applications Jonas Magazinius, Daniel Hedin, and Andrei Sabelfeld Chalmers University of Technology, Gothenburg, Sweden Abstract. Securing JavaScript in the browser is

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2013-12-06 11:26:36
UPDATE