Zobrazeno 1 - 10
of 94
pro vyhledávání: '"Miller Zach"'
The Log Structured Merge Trees (LSM-tree) based key-value stores are widely used in many storage systems to support a variety of operations such as updates, point reads, and range reads. Traditionally, LSM-tree's merge policy organizes data into mult
Externí odkaz:
http://arxiv.org/abs/2305.05074
Publikováno v:
EPJ Web of Conferences, Vol 214, p 04014 (2019)
Outside the HEP computing ecosystem, it is vanishingly rare to encounter user X509 certificate authentication (and proxy certificates are even more rare). The web never widely adopted the user certificate model, but increasingly sees the need for fed
Externí odkaz:
https://doaj.org/article/986ccf83635142a9ab47e50781cf3130
Autor:
Withers, Alex, Bockelman, Brian, Weitzel, Derek, Brown, Duncan, Patton, Jason, Gaynor, Jeff, Basney, Jim, Tannenbaum, Todd, Gao, You Alex, Miller, Zach
The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers. Problems with credentials (e.g., expiration, privilege mismatch) cause workflows t
Externí odkaz:
http://arxiv.org/abs/1905.09816
Autor:
Withers, Alex, Bockelman, Brian, Weitzel, Derek, Brown, Duncan, Gaynor, Jeff, Basney, Jim, Tannenbaum, Todd, Miller, Zach
The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers. Problems with credentials (e.g., expiration, privilege mismatch) cause workflows t
Externí odkaz:
http://arxiv.org/abs/1807.04728
Autor:
Bamezai, Sharika, Zhang, Yapei, Kumari, Manisha, Lotfi, Mozhgan, Alsaigh, Tom, Luo, Lingfeng, Kumar, Gayatri Suresh, Wang, Fudi, Ye, Jianqin, Puri, Madhu, Manchanda, Romila, Paluri, Sesha, Adkar, Shaunak S., Kojima, Yoko, Ingelsson, Alice, Bell, Caitlin F., Lopez, Nicolas G., Fu, Changhao, Choi, Ryan B., Miller, Zach
Publikováno v:
Nature Communications; 9/14/2024, Vol. 15 Issue 1, p1-13, 13p
Publikováno v:
J.Phys.Conf.Ser.219:042017,2010
Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communicatio
Externí odkaz:
http://arxiv.org/abs/1011.0715
Publikováno v:
Weed Science, 2018 Jul 01. 66(4), 548-557.
Externí odkaz:
https://www.jstor.org/stable/26505875
Publikováno v:
Weed Science, 2018 Jul 01. 66(4), 540-547.
Externí odkaz:
https://www.jstor.org/stable/26505874
Autor:
Ishaq, Suzanne L., Johnson, Stephen P., Miller, Zach J., Lehnhoff, Erik A., Olivo, Sarah, Yeoman, Carl J., Menalled, Fabian D.
Publikováno v:
Microbial Ecology, 2017 Feb 01. 73(2), 417-434.
Externí odkaz:
https://www.jstor.org/stable/48723410
Publikováno v:
In Molecular Imaging Edition: Second Edition. 2021:1517-1538