Sciweavers

234 search results - page 45 / 47
» Proof Nets and the Identity of Proofs
Sort
View
WPES
2005
ACM
15 years 3 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
ERCIMDL
2004
Springer
112views Education» more  ERCIMDL 2004»
15 years 3 months ago
System Support for Name Authority Control Problem in Digital Libraries: OpenDBLP Approach
In maintaining Digital Libraries, having bibliographic data up-to-date is critical, yet often minor irregularities may cause information isolation. Unlike documents for which vario...
Yoojin Hong, Byung-Won On, Dongwon Lee
ECOOPW
1999
Springer
15 years 2 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
PET
2010
Springer
15 years 2 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
85
Voted
DICS
2006
15 years 19 hour ago
Dependable Software
Achieving software reliability takes many complementary techniques, directed at the process or at the products. This survey summarizes some of the most fruitful ideas. 1 OVERVIEW ...
Bertrand Meyer