Sciweavers

555 search results - page 52 / 111
» Anonymous Webs of Trust
Sort
View
DEXAW
2005
IEEE
117views Database» more  DEXAW 2005»
15 years 3 months ago
DMW - A Middleware for Digital Rights Management in Peer-to-Peer Networks
Enforcing DRM in collaborative, Peer-to-Peer (P2P) networks comprising different types of user devices is a challenging task as it is difficult to monitor the network operations i...
Praveen Kumar, G. Sridhar, V. Sridhar, R. Gadh
DEXAW
2000
IEEE
134views Database» more  DEXAW 2000»
15 years 2 months ago
Agent-Oriented Concepts to Foster the Automation of E-Business
Improving the efficiency of e-Business usage requires the further development of automation techniques for interorganizational business processes as a major driver. Automation ca...
Andreas Bartelt, Winfried Lamersdorf
PERCOM
2010
ACM
14 years 7 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
IACR
2011
130views more  IACR 2011»
13 years 9 months ago
Hiding the Policy in Cryptographic Access Control
Abstract. Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows ...
Sascha Müller, Stefan Katzenbeisser
CMS
2003
120views Communications» more  CMS 2003»
14 years 11 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...