Sciweavers

744 search results - page 41 / 149
» The Traust Authorization Service
Sort
View
JCP
2006
118views more  JCP 2006»
14 years 9 months ago
A Method of An Anonymous Authentication For Flat-rate Service
As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy ...
Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji
BROADNETS
2005
IEEE
15 years 3 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 2 months ago
Serviceflow Management: Caring for the Citizen's Concern in Designing E-government Transaction Processes
Many authorities have started to use web sites to provide services based on transactions. The guiding vision is often a process portal for citizens that provides access to the cou...
Ralf Klischewski, Ingrid Wetzel
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
15 years 4 months ago
Breaching the Knowledge Transfer Blockade in IT Offshore Outsourcing Projects - A Case from the Financial Services Industry
In this paper the authors present the results of a research project that strives to fill a literature gap in IT offshore outsourcing research by analyzing clientside managerial me...
Robert Gregory, Roman Beck, Michael Prifling
ICCSA
2007
Springer
15 years 1 months ago
Estimation of TTP Features in Non-repudiation Service
In order to achieve a high performance in a real implementation of the non-repudiation service it is necessary to estimate timeouts, TTP features, publication key time, number of o...
Mildrey Carbonell, José María Sierra...