Sciweavers

2560 search results - page 148 / 512
» Securing VO Management
Sort
View
144
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
Improving Deployability of Peer-Assisted CDN Platform with Incentive
Abstract—As a promising solution to manage the huge workload of large-scale VoD services, managed peer-assisted CDN systems, such as P4P [25] has attracted attention. Although th...
Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, H...
IEEEARES
2010
IEEE
15 years 11 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
CHIMIT
2009
ACM
15 years 11 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
140
Voted
SOUPS
2006
ACM
15 years 10 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
P2P
2003
IEEE
157views Communications» more  P2P 2003»
15 years 9 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu