Sciweavers

969 search results - page 154 / 194
» Designing to support adversarial collaboration
Sort
View
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
15 years 7 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
WIKIS
2005
ACM
15 years 3 months ago
Wiki communities in the context of work processes
In this article we examine the integration of communities of practice supported by a wiki into work processes. Linear structures are often inappropriate for the execution of knowl...
Frank Fuchs-Kittowski, André Köhler
FIDJI
2004
Springer
15 years 3 months ago
Task-Based Access Control for Virtual Organizations
Abstract. GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual o...
Panos Periorellis, Savas Parastatidis
CHI
1992
ACM
15 years 2 months ago
Gardeners and Gurus: Patterns of Cooperation Among CAD Users
We studied CAD system users to find out how they use the sophisticated customization and extension facilities offered by many CAD products. We found that users of varying levels o...
Michelle Gantt, Bonnie A. Nardi
APPT
2009
Springer
15 years 1 months ago
MaGate Simulator: A Simulation Environment for a Decentralized Grid Scheduler
Abstract. This paper presents a simulator for of a decentralized modular grid scheduler named MaGate. MaGate’s design emphasizes scheduler interoperability by providing intellige...
Ye Huang, Amos Brocco, Michèle Courant, B&e...