Sciweavers

744 search results - page 56 / 149
» The Traust Authorization Service
Sort
View
JCM
2006
99views more  JCM 2006»
14 years 9 months ago
VIP (VHE in Mobile IP Networks) Architecture
In this study we propose a new architecture named VIP (VHE in mobile IP networks) which guarantees authorized user access and user mobility management. The main goal is to bring th...
Octavio Ramirez Rojas, Jalel Ben-Othman, Safouane ...
MST
2010
196views more  MST 2010»
14 years 4 months ago
Non-Cooperative Cost Sharing Games via Subsidies
We consider a cost sharing system where users are selfish and act according to their own interest. There is a set of facilities and each facility provides services to a subset of ...
Niv Buchbinder, Liane Lewin-Eytan, Joseph Naor, Ar...
DIM
2005
ACM
14 years 11 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
VLDB
2006
ACM
172views Database» more  VLDB 2006»
15 years 10 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
EEE
2004
IEEE
15 years 1 months ago
An Efficient, Secure and Delegable Micro-Payment System
In this paper, we propose a new efficient and secure micro-payment scheme, named e-coupons, which can provide the users the facility of delegating their spending capability to oth...
Vishwas Patil, R. K. Shyamasundar