Sciweavers

674 search results - page 18 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
IEEESCC
2005
IEEE
15 years 3 months ago
Efficient Information Service Management Using Service Club in CROWN Grid
The main goal of our key project, CROWN Grid, is to empower in-depth integration of resources and cooperation of researchers nationwide and worldwide. In CROWN, Information Servic...
Chunming Hu, Jinpeng Huai, Yanmin Zhu, Yunhao Liu,...
FGCS
2008
159views more  FGCS 2008»
14 years 9 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 4 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
COMPSAC
2000
IEEE
15 years 2 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
90
Voted
CCS
2006
ACM
15 years 1 months ago
Provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Fe...