Sciweavers

1917 search results - page 204 / 384
» User Model and Utility Based Power Management
Sort
View
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
15 years 9 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
AIMSA
2008
Springer
15 years 10 months ago
A Logical Approach to Dynamic Role-Based Access Control
Since its formalization RBAC has become the yardstick for the evaluation of access control formalisms. In order to meet organizational needs, it has been extended along several di...
Philippe Balbiani, Yannick Chevalier, Marwa El Hou...
ASIACRYPT
2005
Springer
15 years 9 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
CAISE
2006
Springer
15 years 8 months ago
Community based Ubiquitous System Development in Multi-agent Environment
Ubiquitous system can be considered as the intelligent space, in which many kinds of component are connected by networks and also each component recognizes their connection and coo...
Youna Jung, Jungtae Lee, Minkoo Kim
145
Voted
CORR
2011
Springer
136views Education» more  CORR 2011»
14 years 8 months ago
Eliciting Forecasts from Self-interested Experts: Scoring Rules for Decision Makers
Scoring rules for eliciting expert predictions of random variables are usually developed assuming that experts derive utility only from the quality of their predictions (e.g., sco...
Craig Boutilier