Sciweavers

27 search results - page 2 / 6
» wetice 2003
Sort
View
WETICE
2003
IEEE
13 years 10 months ago
Policy Storage for Role-Based Access Control Systems
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
András Belokosztolszki, David M. Eyers, Wei...
WETICE
2003
IEEE
13 years 10 months ago
Proactive Knowledge Distribution for Agile Processes
Monitored distribution (MD) is a case-based approach for proactive knowledge distribution. MD allows the dissemination of knowledge artifacts in a just-in-time fashion in the cont...
Rosina Weber
WETICE
2003
IEEE
13 years 10 months ago
Practical Anonymity for the Masses with Mix-Networks
Designing mix-networks for low-latency applications that offer acceptable performance and provide good resistance against attacks without introducing too much overhead is very dif...
Marc Rennhard, Bernhard Plattner
WETICE
2003
IEEE
13 years 10 months ago
Use of Scenario Evaluation in Preparation for Deployment of a Collaborative System for Knowledge Transfer - the Case of KiMERA
This paper presented an approach for the evaluation of a collaborative system, after the completion of system development and software testing but before its deployment. Scenario ...
Lydia M. S. Lau, Craig A. Adams, Peter M. Dew, Chr...
WETICE
2003
IEEE
13 years 10 months ago
Supporting Digital Signatures in Mobile Environments
Digital signatures, like physical signatures, can verify that a specific user affixed their signature to a document and they can also verify that the document is the same as when ...
Scott Campbell