Sciweavers

744 search results - page 98 / 149
» The Traust Authorization Service
Sort
View
CN
2007
172views more  CN 2007»
14 years 9 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
CORR
2007
Springer
85views Education» more  CORR 2007»
14 years 9 months ago
Interface groups and financial transfer architectures
Analytic execution architectures have been proposed by the same authors as a means to conceptualize the cooperation between heterogeneous collectives of components such as program...
Jan A. Bergstra, Alban Ponse
JAR
2006
101views more  JAR 2006»
14 years 9 months ago
Checking Consistency and Completeness of On-Line Product Manuals
Abstract. As products are growing more complex, so is their documentation. With an increasing number of product options, the diversity in service and maintenance procedures grows a...
Carsten Sinz, Wolfgang Küchlin, Dieter Feicht...
COMPSEC
2004
104views more  COMPSEC 2004»
14 years 9 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu
SIGUCCS
2003
ACM
15 years 3 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah