Secure network data

作者: Thomas Eaton Conklin , Vinay Saxena

DOI:

关键词: Network Admission ControlHost (network)Network simulationNetwork management applicationComputer networkNetwork management stationIntelligent computer networkNetwork architectureNetwork dataComputer science

摘要: Disclosed herein are a system, non-transitofy computer readable medium, and method to secure network data. It is determined whether an application can execute in first based on information associated with the network. The transferred second network, if it that cannot A connection established between data residing

参考文章(35)
Eric Jason Brandwine, Kevin Christopher Miller, Providing dynamically scaling computing load balancing ,(2009)
Lauren Ann Cotugno, Margaret Lustig, Scott Costello, Secure custom application cloud computing architecture ,(2009)
William J. Bolosky, James R. Larus, Arnold N. Blinn, Michael Connolly, Ira L. Snyder, Gary W. Flake, Debi P. Mishra, David R. Treadwell, Amit Mital, Lili Cheng, Henricus Johannes Maria Meijer, Alexander G. Gounares, Matthew B. MacLaurin, Migrating data to new cloud ,(2006)
Bashar Said Bou-Diab, Brian Mcbride, Laura Mihaela Serghi, Public and private network service management systems and methods ,(2005)
Eric Pulier, Frank Martinez, Duncan Christopher Hill, System and method for a cloud computing abstraction layer ,(2011)
Qingqing Li, Rao Sandeep Hebbani Raghavendra, Matthew Robertson, Secure data transfer in a virtual environment ,(2010)