Sciweavers

40 search results - page 6 / 8
» Proxy-Based Authorization and Accounting for Distributed Sys...
Sort
View
IJNSEC
2007
111views more  IJNSEC 2007»
14 years 11 months ago
A Novel Peer-to-peer Payment Protocol
In this paper a novel electronic payment protocol suitable for “peer-to-peer” (P2P) networks is presented. It implements electronic cash-based transactions, between buyers and...
Despoina Palaka, Petros Daras, Kosmas Petridis, Mi...
DIM
2005
ACM
15 years 1 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
CHI
2008
ACM
16 years 4 hour ago
Design, adoption, and assessment of a socio-technical environment supporting independence for persons with cognitive disabilitie
A significant fraction of persons with cognitive disabilities are potentially able to live more independently with the use of powerful tools embedded in their social environment. ...
Stefan Carmien, Gerhard Fischer
SC
2005
ACM
15 years 5 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
HPDC
2010
IEEE
15 years 21 days ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim