Sciweavers

341 search results - page 58 / 69
» A dynamic key management solution to access hierarchy
Sort
View
ICAC
2009
IEEE
15 years 4 months ago
Applying genetic algorithms to decision making in autonomic computing systems
Increasingly, applications need to be able to self-reconfigure in response to changing requirements and environmental conditions. Autonomic computing has been proposed as a means...
Andres J. Ramirez, David B. Knoester, Betty H. C. ...
EEE
2005
IEEE
15 years 3 months ago
A Broker-Based Framework for QoS-Aware Web Service Composition
Web services are modular web applications that can be independently deployed and invoked by other software or services on the web. This offers enterprises the capability to integr...
Tao Yu, Kwei-Jay Lin
CCS
2009
ACM
15 years 10 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...
SAINT
2005
IEEE
15 years 3 months ago
Adaptive Semantic Support Provisioning in Mobile Internet Environments
The Mobile Internet scenario encourages the design and development of context-aware applications that provide results depending on context information, such as the relative positi...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
CCS
2009
ACM
15 years 10 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen