Sciweavers

3544 search results - page 416 / 709
» Information Security in Open Systems
Sort
View
CRITIS
2006
15 years 3 months ago
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures....
Cristina Alcaraz, Rodrigo Roman
POPL
2000
ACM
15 years 3 months ago
Generalized Certificate Revocation
We introduce a language for creating and manipulating certificates, that is, digitally signed data based on public key cryptography, and a system for revoking certificates. Our ap...
Carl A. Gunter, Trevor Jim
CHI
2009
ACM
15 years 4 months ago
A tag in the hand: supporting semantic, social, and spatial navigation in museums
Designers of mobile, social systems must carefully think about how to help their users manage spatial, semantic, and social modes of navigation. Here, we describe our deployment o...
Dan Cosley, Jonathan Baxter, Soyoung Lee, Brian Al...
WWW
2004
ACM
16 years 16 days ago
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
A scalable approach to trust negotiation is required in Web service environments that have large and dynamic requester populations. We introduce Trust-Serv, a model-driven trust n...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati
MOBILITY
2009
ACM
15 years 4 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...