Sciweavers

1587 search results - page 156 / 318
» Access Control for Shared Resources
Sort
View
109
Voted
CCS
2007
ACM
15 years 7 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
107
Voted
NCA
2005
IEEE
15 years 6 months ago
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications
In distributed P2P environments, peers (i.e., users) often have to request the services from some unfamiliar peers (i.e., resources) that could be altruistic, selfish, or even ma...
William Sears, Zhen Yu, Yong Guan
SIGMETRICS
2004
ACM
118views Hardware» more  SIGMETRICS 2004»
15 years 6 months ago
A game theoretic approach to provide incentive and service differentiation in P2P networks
Traditional Peer-to-Peer (P2P) networks do not provide service differentiation and incentive for users. Consequently, users can easily access information without contributing any ...
Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui, D...
98
Voted
DSD
2002
IEEE
146views Hardware» more  DSD 2002»
15 years 5 months ago
Configurable Memory Organisation for Communication Applications
A configurable memory organisation for the execution of Hiperlan/2 transceiver baseband processing and MPEG2 decoding is presented. The configuration of the memory system is done ...
Juha-Pekka Soininen, Antti Pelkonen, Jussi Roivain...
106
Voted
CSCW
1996
ACM
15 years 4 months ago
Designing Object-Oriented Synchronous Groupware with COAST
This paper introduces COAST, an object-oriented toolkit for the development of synchronous groupware, which enhances the usability and simplifies the development of such applicati...
Christian Schuckmann, Lutz Kirchner, Jan Schü...