Sciweavers

6555 search results - page 924 / 1311
» Secure attribute-based systems
Sort
View
AINA
2009
IEEE
15 years 10 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
IPPS
2002
IEEE
15 years 9 months ago
Research and Design of a Middleware for Supporting Wide-Area Distributed Applications
As the platform for wide-area distributed applications, the middleware architecture should support adaptability, scalability, mobility, reliability and security. However, current ...
Dong Zhao, Shaowen Yao, Mingtian Zhou
MSS
2000
IEEE
103views Hardware» more  MSS 2000»
15 years 9 months ago
Using Track-Following Servo Technology on LTO Tape Drives
Fall COMDEX was the center of numerous showings of new tape technologies offering significant increases in tape capacity and performance. Of interest to users of midrange tape tec...
Randy Glissman
ASIACRYPT
2000
Springer
15 years 9 months ago
Strengthening McEliece Cryptosystem
McEliece cryptosystem is a public-key cryptosystem based on error-correcting codes. It constitutes one of the few alternatives to cryptosystems relying on number theory. We present...
Pierre Loidreau
125
Voted
ISN
1998
Springer
15 years 9 months ago
Business and Market Models of Brokerage in Network-Based Commerce
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...