Sciweavers

1573 search results - page 208 / 315
» Strong User Authentication
Sort
View
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 3 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
95
Voted
LREC
2008
113views Education» more  LREC 2008»
15 years 3 months ago
Integration of a Multilingual Keyword Extractor in a Document Management System
In this paper we present a new Document Management System called DrStorage. This DMS is multi-platform, JCR-170 compliant, supports WebDav, versioning, user authentication and aut...
Andrea Agili, Marco Fabbri, Alessandro Panunzi, Ma...
INTERACT
2003
15 years 3 months ago
Enticing People to Interact with Large Public Displays in Public Spaces
: Large displays are increasingly being placed in public places to support community and social activities. However, a major problem that has been observed with this new form of pu...
Harry Brignull, Yvonne Rogers
FIW
2000
114views Communications» more  FIW 2000»
15 years 3 months ago
Feature Interaction in Internet Telephony
While Internet telephony aims to provide services at least equal to traditional telephony, the architecture of Internet telephony is sufficiently different to make it necessary to ...
Jonathan Lennox, Henning Schulzrinne
JCP
2008
216views more  JCP 2008»
15 years 1 months ago
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Xiaofeng Chen 0004, Dengguo Feng