Sciweavers

40 search results - page 7 / 8
» Achieving trust in IT outsourcing relationships
Sort
View
JHSN
2006
96views more  JHSN 2006»
13 years 5 months ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...
HICSS
2008
IEEE
103views Biometrics» more  HICSS 2008»
13 years 11 months ago
Great Scrums Need Great Product Owners: Unbounded Collaboration and Collective Product Ownership
Scrum describes a separation of roles; the product owner is accountable for achieving business objectives and the team for technical execution. A pragmatic and collegial relations...
Ken H. Judy, Ilio Krumins-Beens
CISC
2008
Springer
118views Cryptology» more  CISC 2008»
13 years 7 months ago
Inter-domain Identity-Based Proxy Re-encryption
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
Qiang Tang, Pieter H. Hartel, Willem Jonker
AINA
2006
IEEE
13 years 11 months ago
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks
Design of protocols for mobile ad-hoc networks (MANETs) is generally tricky compared to wired networks, because on the one hand the increased communication constraints given by th...
Lijun Liao, Mark Manulis
CDC
2009
IEEE
155views Control Systems» more  CDC 2009»
13 years 9 months ago
Efficient and robust communication topologies for distributed decision making in networked systems
Distributed decision making in networked systems depends critically on the timely availability of critical fresh information. Performance of networked systems, from the perspective...
John S. Baras, Pedram Hovareshti