scholarly journals Locality-aware request distribution in cluster-based network servers

Author(s):  
Vivek S. Pai ◽  
Mohit Aron ◽  
Gaurov Banga ◽  
Michael Svendsen ◽  
Peter Druschel ◽  
...  
1998 ◽  
Vol 33 (11) ◽  
pp. 205-216 ◽  
Author(s):  
Vivek S. Pai ◽  
Mohit Aron ◽  
Gaurov Banga ◽  
Michael Svendsen ◽  
Peter Druschel ◽  
...  

1998 ◽  
Vol 32 (5) ◽  
pp. 205-216 ◽  
Author(s):  
Vivek S. Pai ◽  
Mohit Aron ◽  
Gaurov Banga ◽  
Michael Svendsen ◽  
Peter Druschel ◽  
...  

2007 ◽  
Vol 9 (2) ◽  
Author(s):  
P. L. Wessels ◽  
L. P. Steenkamp

One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information. 


Sign in / Sign up

Export Citation Format

Share Document