Sciweavers

3712 search results - page 468 / 743
» Role-Based Access Control
Sort
View
ISPEC
2007
Springer
15 years 11 months ago
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do no...
Yanjiang Yang, Robert H. Deng, Feng Bao
IWSEC
2007
Springer
15 years 11 months ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni
OTM
2007
Springer
15 years 11 months ago
The OpenKnowledge System: An Interaction-Centered Approach to Knowledge Sharing
The information that is made available through the semantic web will be accessed through complex programs (web-services, sensors, etc.) that may interact in sophisticated ways. Com...
Ronny Siebes, David Dupplaw, Spyros Kotoulas, Adri...
PVM
2007
Springer
15 years 11 months ago
(Sync|Async)+ MPI Search Engines
We propose a parallel MPI search engine that is capable of automatically switching between asynchronous message passing and bulk-synchronous message passing modes of operation. Whe...
Mauricio Marín, Veronica Gil Costa
SEKE
2007
Springer
15 years 11 months ago
Real-Time Trust Management in Agent Based Online Auction Systems
Agent based online auctions have not yet become popular because they are not trustable. One of the major concerns in agent based online auctions is the shilling behavior problem, w...
Rinkesh Patel, Haiping Xu, Ankit Goel