Sciweavers

490 search results - page 61 / 98
» Enabling User Control with Personal Identity Management
Sort
View
91
Voted
FCCM
2005
IEEE
107views VLSI» more  FCCM 2005»
15 years 6 months ago
Simplifying the Integration of Processing Elements in Computing Systems Using a Programmable Controller
As technology sizes decrease and die area increases, designers are creating increasingly complex computing systems using FPGAs. To reduce design time for new products, the reuse o...
Lesley Shannon, Paul Chow
99
Voted
CAISE
2007
Springer
15 years 6 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
WWW
2007
ACM
16 years 1 months ago
Simple authentication for the web
Automated email-based password reestablishment (EBPR) is an efficient, cost-effective means to deal with forgotten passwords. In this technique, email providers authenticate users ...
Timothy W. van der Horst, Kent E. Seamons
DELOS
2004
15 years 1 months ago
Supporting Information Access in Next Generation Digital Library Architectures
Current developments on Service-oriented Architectures, Peer-to-Peer and Grid computing promise more open and flexible architectures for digital libraries. They will open DL techno...
Ingo Frommholz, Predrag Knezevic, Bhaskar Mehta, C...
POLICY
2005
Springer
15 years 6 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...