Sciweavers

2560 search results - page 171 / 512
» Securing VO Management
Sort
View
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 11 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
ICQNM
2008
IEEE
178views Chemistry» more  ICQNM 2008»
15 years 11 months ago
A Quantum Network Manager that Supports a One-Time Pad Stream
We have begun to expand the NIST quantum key distribution (QKD) system into a quantum network to support secure cryptography. We are starting with a simple three-node network, one...
Alan Mink, Lijun Ma, Tassos Nakassis, Hai Xu, Oliv...
GRID
2007
Springer
15 years 11 months ago
Grid metadata management: Requirements and architecture
Abstract— Metadata annotations of Grid resources can potentially be used for a number of purposes, including accurate resource allocation to jobs, discovery of services, and prec...
Óscar Corcho, Pinar Alper, Paolo Missier, S...
PERCOM
2006
ACM
15 years 11 months ago
A Campus-Wide Mobile EMS Information Management System
—Efficient information management is crucial for the timely administration of Emergency Medical Services (EMS). In this paper, we describe a project to design and implement an au...
Brian R. L'Heureux, Michael J. McHugh, Benjamin D....
AINA
2005
IEEE
15 years 10 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho