Sciweavers

1725 search results - page 161 / 345
» Feature-based recommendation system
Sort
View
WETICE
2006
IEEE
15 years 10 months ago
Authorisation Using Attributes from Multiple Authorities
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....
David W. Chadwick
CSCWD
2005
Springer
15 years 10 months ago
Supporting peer-to-peer collaboration through trust
Distributed systems generally require their component parts to interact cooperatively, in order for the system as a whole to function effectively. For any given activity, several ...
Nathan Griffiths, Shanghua Sun
164
Voted
CSCW
2004
ACM
15 years 10 months ago
Learning from project history: a case study for software development
The lack of lightweight communication channels and other technical and sociological difficulties make it hard for new members of a non-collocated software development team to lea...
Davor Cubranic, Gail C. Murphy, Janice Singer, Kel...
154
Voted
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
14 years 5 days ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...
127
Voted
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
15 years 10 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick