Sciweavers

859 search results - page 36 / 172
» Security for Key Management Interfaces
Sort
View
WWW
2001
ACM
16 years 15 days ago
Batch rekeying for secure group communications
Many emerging web and Internet applications are based on a group communications model. Thus, securing group communications is an important Internet design issue. The key graph app...
Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G....
CHI
2011
ACM
14 years 3 months ago
A spreadsheet-based user interface for managing plural relationships in structured data
A key feature of relational database applications is managing plural relationships—one-to-many and many-to-many— between entities. However, since it is often infeasible to ado...
Eirik Bakke, David R. Karger, Rob Miller
CACM
1998
83views more  CACM 1998»
14 years 11 months ago
A Pattern System for Network Management Interfaces
: The development of network management interfaces (NMIs) involves a variety of software layers, application programming interfaces (APIs), specification languages and tools. In or...
Rudolf K. Keller, Jean Tessier, Gregor von Bochman...
SOUPS
2005
ACM
15 years 5 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
IEEEIAS
2008
IEEE
15 years 6 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell