Sciweavers

555 search results - page 52 / 111
» Anonymous Webs of Trust
Sort
View
DEXAW
2005
IEEE
117views Database» more  DEXAW 2005»
15 years 5 months ago
DMW - A Middleware for Digital Rights Management in Peer-to-Peer Networks
Enforcing DRM in collaborative, Peer-to-Peer (P2P) networks comprising different types of user devices is a challenging task as it is difficult to monitor the network operations i...
Praveen Kumar, G. Sridhar, V. Sridhar, R. Gadh
DEXAW
2000
IEEE
134views Database» more  DEXAW 2000»
15 years 4 months ago
Agent-Oriented Concepts to Foster the Automation of E-Business
Improving the efficiency of e-Business usage requires the further development of automation techniques for interorganizational business processes as a major driver. Automation ca...
Andreas Bartelt, Winfried Lamersdorf
PERCOM
2010
ACM
14 years 9 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
IACR
2011
130views more  IACR 2011»
13 years 11 months ago
Hiding the Policy in Cryptographic Access Control
Abstract. Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows ...
Sascha Müller, Stefan Katzenbeisser
CMS
2003
120views Communications» more  CMS 2003»
15 years 1 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...