Sciweavers

422 search results - page 31 / 85
» Risk management for distributed authorization
Sort
View
103
Voted
ISI
2008
Springer
15 years 17 days ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
89
Voted
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
15 years 5 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
100
Voted
CCS
2009
ACM
16 years 1 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
120
Voted
ESAS
2007
Springer
15 years 6 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
84
Voted
CSCW
2010
ACM
15 years 9 months ago
Sources of errors in distributed development projects: implications for collaborative tools
An important dimension of success in development projects is the quality of the new product. Researchers have primarily concentrated on developing and evaluating processes to redu...
Marcelo Cataldo