Sciweavers

603 search results - page 29 / 121
» Agilent's Key Technologies in Remote System Management
Sort
View
HICSS
2005
IEEE
157views Biometrics» more  HICSS 2005»
15 years 5 months ago
Integration Technology Adoption in Healthcare Organisations: A Case for Enterprise Application Integration
A continuous technological innovation in software has brought development in integration technologies that promise the real time enterprise-wide systems integration. Healthcare or...
Khalil Khoumbati, Marinos Themistocleous, Zahir Ir...
ATAL
2004
Springer
15 years 5 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
CEAS
2005
Springer
15 years 5 months ago
Accredited DomainKeys: A Service Architecture for Improved Email Validation
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
USENIX
2003
15 years 1 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
SECURWARE
2008
IEEE
15 years 6 months ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...