Sciweavers

1363 search results - page 123 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
15 years 5 months ago
Reducing Trust in the PKG in Identity Based Cryptosystems
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Vipul Goyal
OZCHI
2006
ACM
15 years 5 months ago
From the certainty of information transfer to the ambiguity of intuition
Handovers between shifts are known causes of preventable adverse events in hospitals. In order to gain an insight into the information transfer that occurs between shifts of senio...
Florian Mueller, Stefanie Kethers, Leila Alem, Ros...
EDOC
2005
IEEE
15 years 5 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
KCAP
2005
ACM
15 years 4 months ago
A case study of wiki-based experience repository at a medium-sized software company
The paper reports on an exploratory case study where an organizational learning methodology was used to support knowledge sharing in a medium-sized distributed software developmen...
Thomas Chau, Frank Maurer
SACMAT
2004
ACM
15 years 4 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...