Sciweavers

24529 search results - page 265 / 4906
» Computing on Authenticated Data
Sort
View
63
Voted
COMPUTER
2007
37views more  COMPUTER 2007»
15 years 3 months ago
Measuring Data Management Practice Maturity: A Community's Self-Assessment
Peter Aiken, M. David Allen, Burt Parker, Angela M...
94
Voted
COMPUTER
2007
110views more  COMPUTER 2007»
15 years 3 months ago
Data Consistency for Cooperative Caching in Mobile Environments
Jiannong Cao, Yang Zhang, Guohong Cao, Li Xie
66
Voted
COMPUTER
2007
91views more  COMPUTER 2007»
15 years 3 months ago
A Data Integration Broker for Healthcare Systems
David Budgen, Michael Rigby, Pearl Brereton, Mark ...
143
Voted
CCS
2007
ACM
15 years 10 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
157
Voted
SACMAT
2003
ACM
15 years 9 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons