Sciweavers

744 search results - page 85 / 149
» The Traust Authorization Service
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 4 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
MM
2006
ACM
124views Multimedia» more  MM 2006»
15 years 3 months ago
Leveraging community annotations for image adaptation to small presentation formats
In this paper, we describe an investigation into the use of community annotations of photos for creating zoom and pan animations that present a time linear view of the regions of ...
Patrick Schmitz
ACSAC
2005
IEEE
15 years 3 months ago
Uniform Application-level Access Control Enforcement of Organizationwide Policies
Fine-grained and expressive access control policies on application resources need to be enforced in applicationlevel code. Uniformly enforcing a single policy (referred to as the ...
Tine Verhanneman, Frank Piessens, Bart De Win, Wou...
RTCSA
2005
IEEE
15 years 3 months ago
A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems
Context aware middleware infrastructures have traditionally been implemented with a modular approach to allow different components to work cooperatively and supply context synthes...
Saad Liaquat Kiani, Maria Riaz, Yonil Zhung, Sungy...
ICCSA
2005
Springer
15 years 3 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...