Sciweavers

579 search results - page 50 / 116
» Secure Access to Medical Data over the Internet
Sort
View
ISADS
1999
IEEE
15 years 5 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
TELSYS
2008
98views more  TELSYS 2008»
15 years 1 months ago
Multicast deflector
Abstract Technological evolution is leading telecommunications toward all-IP scenarios, where multiple services are transported as IP packets. Among these services is the broadcast...
António Pinto, Manuel Ricardo
SEMWEB
2009
Springer
15 years 8 months ago
Populating the Semantic Web by Macro-reading Internet Text
A key question regarding the future of the semantic web is “how will we acquire structured information to populate the semantic web on a vast scale?” One approach is to enter t...
Tom M. Mitchell, Justin Betteridge, Andrew Carlson...
ACSAC
2001
IEEE
15 years 5 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
SIGCSE
2005
ACM
124views Education» more  SIGCSE 2005»
15 years 7 months ago
The virtual network system
The goal of our work is to give students a hands-on experience designing, deploying and debugging parts of the Internet infrastructure, such as an Internet router that routes real...
Martin Casado, Nick McKeown