Sciweavers

706 search results - page 79 / 142
» Trust management for IPsec
Sort
View
APCSAC
2003
IEEE
15 years 5 months ago
User-Level Management of Kernel Memory
Abstract. Kernel memory is a resource that must be managed carefully in order to ensure the efficiency and safety of the system. The use of an inappropriate management policy can w...
Andreas Haeberlen, Kevin Elphinstone
CCS
2000
ACM
15 years 3 months ago
Accountable certificate management using undeniable attestations
This paper initiates a study of accountable certificate management methods, necessary to support long-term authenticity of digital documents. Our main contribution is a model for ...
Ahto Buldas, Peeter Laud, Helger Lipmaa
DRM
2008
Springer
15 years 1 months ago
A four-layer model for security of digital rights management
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This co...
Eric Diehl
HICSS
2008
IEEE
94views Biometrics» more  HICSS 2008»
15 years 6 months ago
The Impact of Conflict and Conflict Management Style on Deadbeats and Deserters in Virtual Teams
Individuals face additional challenges when interacting in virtual teams. The lack of media richness and the asynchronous nature of technologically transmitted messages make commu...
Kimberly A. Furumo
IPCCC
2006
IEEE
15 years 5 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin