Sciweavers

6555 search results - page 1062 / 1311
» Secure attribute-based systems
Sort
View
124
Voted
AIS
2004
Springer
15 years 9 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim
125
Voted
ATAL
2004
Springer
15 years 9 months ago
Self-Protected Mobile Agents
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a ...
Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz
130
Voted
GCC
2004
Springer
15 years 9 months ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...
127
Voted
ICIAR
2004
Springer
15 years 9 months ago
Three-Dimensional Face Recognition: A Fishersurface Approach
Previous work has shown that principal component analysis (PCA) of three-dimensional face models can be used to perform recognition to a high degree of accuracy. However, experimen...
Thomas Heseltine, Nick Pears, Jim Austin
118
Voted
ISI
2004
Springer
15 years 9 months ago
Privacy-Preserving Inter-database Operations
Abstract. We present protocols for distributed computation of relational intersections and equi-joins such that each site gains no information about the tuples at the other site th...
Gang Liang, Sudarshan S. Chawathe
« Prev « First page 1062 / 1311 Last » Next »