Sciweavers

744 search results - page 23 / 149
» The Traust Authorization Service
Sort
View
PERCOM
2010
ACM
14 years 8 months ago
Architecture and protocols for the Internet of Things: A case study
—In this paper, we describe a practical realization of an Internet-of-Things (IoT) architecture at the University of Padova, Italy. Our network spans the floors of different bui...
Angelo Paolo Castellani, Nicola Bui, Paolo Casari,...
CSCW
2012
ACM
13 years 5 months ago
Lurking as personal trait or situational disposition: lurking and contributing in enterprise social media
We examine patterns of participation by employees who are members of multiple online communities in an enterprise communities service. Our analysis focuses on statistical patterns...
Michael Muller
SCN
2010
Springer
132views Communications» more  SCN 2010»
14 years 7 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
WWW
2001
ACM
15 years 10 months ago
Conceptual linking: ontology-based open hypermedia
This paper describes the attempts of the COHSE project to define and deploy a Conceptual Open Hypermedia Service. Consisting of ? an ontological reasoning service which is used to...
Les Carr, Wendy Hall, Sean Bechhofer, Carole A. Go...
PERCOM
2005
ACM
15 years 9 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...