Sciweavers

43 search results - page 4 / 9
» The Key Authority - Secure Key Management in Hierarchical Pu...
Sort
View
CSE
2009
IEEE
14 years 16 days ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...
ISM
2006
IEEE
95views Multimedia» more  ISM 2006»
13 years 11 months ago
Digital Rights Management for Video Sensor Network
Video sensor network is evolving from an isolated system to an integral component of the global information infrastructure. In this paper, we argue that when video sensor network ...
Taojun Wu, Liang Dai, Yuan Xue, Yi Cui
HICSS
2007
IEEE
99views Biometrics» more  HICSS 2007»
14 years 3 days ago
Examining the Impacts of Institutional Framework on E-Government Infrastructures: A Study of Hong Kong Experiences
Since the Hong Kong SAR Government promulgated the first Digital 21 IT Strategy in November 1998, multiple major initiatives had been launched to establish the underlying infrastr...
Chun Yu, Paul Jen-Hwa Hu
COMPSEC
2004
104views more  COMPSEC 2004»
13 years 5 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu
CCGRID
2007
IEEE
14 years 4 days ago
A Hierarchical Two-Tier Information Management Architecture for Mobile Ad-Hoc Grid Environments
A novel management layer architecture for mobile grid environments and ad-hoc networks is presented. This paper addresses a key challenge in dynamic mobile environments with a hig...
Joachim Zottl, Wilfried N. Gansterer, Helmut Hlava...