Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,347,360 papers from all fields of science
Search
Sign In
Create Free Account
Virtual hosting
Known as:
Addon domain
, Host
, Name-based Virtual Host
Expand
Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or pool of servers). This…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Analog
Android
Bare-metal server
Cherokee Web Server
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A Container-Based Virtual Laboratory for Internet Security e-Learning
Johannes Sianipar
,
Christian Willems
,
C. Meinel
2016
Corpus ID: 38005456
Tele-Lab is a platform for e-learning in Internet security with a special focus on teaching by means of handson experience. A…
Expand
2015
2015
The application of Virtualization technology in Grid Computing
Cheng-Long Zhang
,
Dan He
,
Jianlian Xiao
,
Yang Li
International Congress of Mathematicans
2015
Corpus ID: 62067392
In this paper, the author discussed the current popular the grid computation technique and the virtualization technology…
Expand
2013
2013
Benefits of the virtualization technologies with intrusion detection and prevention systems
Murat Çaliskan
,
Mustafa Ozsiginan
,
Emin Kuğu
Advanced Industrial Conference on…
2013
Corpus ID: 16294716
In recent years, virtualization technologies were settled faster than anyone imagined and got placed big areas in our lives…
Expand
2011
2011
A Multi-level Architecture for Collecting and Managing Monitoring Information in Cloud Environments
G. Katsaros
,
Georgina Gallizo
,
Roland Kübert
,
Tinghe Wang
,
J. O. Fitó
,
D. Henriksson
International Conference on Cloud Computing and…
2011
Corpus ID: 42811769
While the Cloud computing paradigm is maturing and gaining wide acceptance, topics like Quality of Service assurance and resource…
Expand
2010
2010
Notice of RetractionA Static Analysis Tool for Detecting Web Application Injection Vulnerabilities for ASP Program
Xin-hua Zhang
,
Zhi-jian Wang
2nd International Conference on E-business and…
2010
Corpus ID: 13930469
Publicly reported vulnerability in recent years strong growth of the Web Application , Cross-site scripting (XSS) and SQL…
Expand
Review
2010
Review
2010
Common Capabilities for Service Oriented Infrastructures and Platforms: An Overview
T. Dimitrakos
Eighth IEEE European Conference on Web Services
2010
Corpus ID: 16435433
Service Oriented Infrastructures including Grid and Cloud Computing are technologies in a critical transition to wider adoption…
Expand
2008
2008
Meeting customer needs
C. Gresty
,
T. Dimitrakos
,
G. Thanos
,
P. Warren
2008
Corpus ID: 9435776
2007
2007
Design patterns for secure virtual organization management architecture
Angelo Gaeta
,
M. Gaeta
,
+4 authors
Sergio Miranda
Security and Privacy in Communication Networks
2007
Corpus ID: 1059728
The work presented in this paper describes an architecture for a secure Virtual Organization Management framework. This work is…
Expand
2006
2006
A Scalable Peer-to-peer Protocol Enabling Efficient and Flexible Search
Reaz Ahmed
,
R. Boutaba
,
D. Cheriton
2006
Corpus ID: 6978223
Efficient discovery of information, based on partial knowledge, is a challenging problem faced by many large scale distributed…
Expand
2006
2006
Trust and security in virtual organisations
Paul Kearney
2006
Corpus ID: 62735116
Technologies such as Web Services and grid computing are making it technically possible for companies to co-operate more closely…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE