Sciweavers

6137 search results - page 196 / 1228
» Securing Collaborative Applications
Sort
View
CSREAEEE
2006
189views Business» more  CSREAEEE 2006»
15 years 3 months ago
Management of Dynamic and Adaptive Workflow Business Processes
: Collaborative and dynamic workflow management systems in logistic companies require strong information systems and computer support. Business processes in such industries general...
Leo Pudhota, Elizabeth Chang
CSUR
1999
78views more  CSUR 1999»
15 years 2 months ago
Rough'n'Ready: A Meeting Recorder and Browser
A great deal of valuable information and content in collaborative situations is lost because it is either too difficult to preserve, or adequate means do not exist to preserve it....
Francis Kubala, Sean Colbath, Daben Liu, John Makh...
WISTP
2007
Springer
15 years 8 months ago
Securing the Distribution and Storage of Secrets with Trusted Platform Modules
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eaves...
Paul E. Sevinç, Mario Strasser, David A. Ba...
SIGCOMM
2006
ACM
15 years 8 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
130
Voted
AVI
2010
15 years 3 months ago
A community based metaphor supporting EUD within communities
The paper proposes an approach to EUD focusing on communities: on the one hand, users are considered as a community of cooperating actors; on the other hand, applications and devi...
Marco P. Locatelli, Carla Simone