Login / Signup
A Highly Available Transparent Linux Cluster Security Model.
Visham Ramsurrun
K. M. Sunjiv Soyjaudah
Published in:
IPCCC (2008)
Keyphrases
</>
security model
public key
access control
security requirements
security analysis
open source
operating system
provably secure
clustering algorithm
designated verifier
database
databases
artificial intelligence
data points