Sciweavers

464 search results - page 38 / 93
» Identity Management for Self-Portrayal
Sort
View
SISW
2003
IEEE
15 years 4 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
IPPS
2007
IEEE
15 years 5 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
ODBIS
2007
Springer
127views Database» more  ODBIS 2007»
15 years 5 months ago
On RDF/S Ontology Evolution
Abstract. The algorithms dealing with the incorporation of new knowledge in an ontology (ontology evolution) often share a rather standard process of dealing with changes. This pro...
George Konstantinidis, Giorgos Flouris, Grigoris A...
COMPUTER
1998
131views more  COMPUTER 1998»
14 years 10 months ago
Windows NT Clustering Service
ER ABSTRACTIONS ter service uses several abstractions— including resource, resource dependencies, and resource groups—to simplify both the cluster service itself and user-visib...
Rod Gamache, Rob Short, Mike Massa
CORR
2008
Springer
104views Education» more  CORR 2008»
14 years 11 months ago
Interoperability between Heterogeneous Federation Architectures: Illustration with SAML and WS-Federation
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architec...
Mikaël Ates, Christophe Gravier, Jér&e...