Sciweavers

35 search results - page 4 / 7
» Using LDAP Directories for Management of PKI Processes
Sort
View
85
Voted
DIM
2005
ACM
14 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
SIGUCCS
2005
ACM
15 years 3 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
ELPUB
2003
ACM
15 years 2 months ago
Ontology Driven Websites/Metamorphosis: A Framework to Specify and Manage Ontology Driven Websites
Website development has always been an hard task: it consumes time and resources. What is new today is normally taken as granted tomorrow by users. This is to say that users always...
José Carlos Ramalho, Giovani Rubert Librelo...
80
Voted
CI
2004
99views more  CI 2004»
14 years 9 months ago
Purpose-Based Expert Finding in a Portfolio Management System
Most of the research inthe area of expert finding focuses on creating and maintaining centralized directories of experts' profiles, which users can search on demand. However, ...
Xiaolin Niu, Gordon I. McCalla, Julita Vassileva
CCGRID
2003
IEEE
15 years 2 months ago
Peer-to-Peer Keyword Search Using Keyword Relationship
Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for Internet-scale information retrieval and search systems because they require neither...
Kiyohide Nakauchi, Yuichi Ishikawa, Hiroyuki Morik...