Sciweavers

57 search results - page 10 / 12
» Controller certification
Sort
View
89
Voted
COLCOM
2007
IEEE
15 years 2 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
15 years 2 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
ESE
2006
199views Database» more  ESE 2006»
14 years 10 months ago
Experiences from introducing UML-based development in a large safety-critical project
UML and UML-based development methods have become de facto standards in industry, and there are many claims for the positive effects of modelling object-oriented systems using meth...
Bente Anda, Kai Hansen, Ingolf Gullesen, Hanne Kri...
GRID
2006
Springer
14 years 10 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
CERA
2004
89views more  CERA 2004»
14 years 10 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao