Abstract | ||
---|---|---|
An end-user computing environment is characterized by an image which is the ensemble comprising operating system, applications and data) and by the hardware where the image is running. One can essentially distinguish two fundamental approaches: either the image is installed on a given end-user owned computer or the image is run on a server and is remotely accessed by the user through a remote desktop. Both approaches, however, have a disadvantage. In the former case, no network connectivity is required as the image is stored on the local computer, this data is lost when the computer such as a notebook is lost or stolen. Moreover, in an enterprise environment, it is very difficult to control that image and apply patches, check for viruses etc. While the latter approach waives these shortcommings, a continuous network connection is required to work with that virtual machine which may not be always available. With the Secure Enterprise Desktop, we bridge this gap and allow users to use their computer image locally or remotely and ensure that their computer image is continuously synchronized. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1007/978-3-642-33427-6_23 | ESOCC |
Keywords | Field | DocType |
secure enterprise desktop,former case,computing infrastructure,end-user computing environment,local computer,latter approach,computer image,network connectivity,fundamental approach,enterprise environment,continuous network connection | Network connectivity,Virtual machine,Computer science,Remote desktop,Network connection,Disadvantage,Operating system,Cloud computing | Conference |
Volume | Citations | PageRank |
7592 | 1 | 0.38 |
References | Authors | |
2 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Thomas Gschwind | 1 | 1 | 0.38 |
Michael Baentsch | 2 | 133 | 25.31 |
Andreas Schade | 3 | 67 | 9.37 |
Paolo Scotton | 4 | 74 | 12.65 |