Sciweavers

98 search results - page 19 / 20
» Modeling Role-based Trust and Authority in Open Environments
Sort
View
INFOCOM
2010
IEEE
13 years 4 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
CHI
2004
ACM
14 years 6 months ago
Examining the robustness of sensor-based statistical models of human interruptibility
Current systems often create socially awkward interruptions or unduly demand attention because they have no way of knowing if a person is busy and should not be interrupted. Previ...
James Fogarty, Scott E. Hudson, Jennifer Lai
ACISP
2009
Springer
14 years 29 days ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
CHI
2006
ACM
14 years 6 months ago
Tableau machine: an alien presence in the home
Research in Ambient Intelligence and Ubiquitous Computing has put computational devices into many social settings while leaving intact much of the "task support and informati...
Mario Romero, Zachary Pousman, Michael Mateas
ICSOC
2004
Springer
13 years 11 months ago
An OGSA-based accounting system for allocation enforcement across HPC centers
In this paper, we present an Open Grid Services Architecture (OGSA)-based decentralized allocation enforcement system, developed with an emphasis on a consistent data model and ea...
Thomas Sandholm, Peter Gardfjäll, Erik Elmrot...