Sciweavers

39 search results - page 4 / 8
» A Group-based Authorization Model for Cooperative Systems
Sort
View
ICICS
2010
Springer
13 years 5 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
ACMDIS
2006
ACM
14 years 1 months ago
How do design and evaluation interrelate in HCI research?
Human-Computer Interaction (HCI) is defined by the Association for Computing Machinery (ACM) Special Interest Group on Computer-Human Interaction (SIGCHI) as “a discipline conce...
Christine E. Wania, Michael E. Atwood, Katherine W...
CHI
2005
ACM
14 years 7 months ago
Awareness systems: known results, theory, concepts and future challenges
The Community Bar is a groupware tool supporting informal awareness and casual interaction for small communities of intimate collaborators. Its conceptual design is primarily base...
Panos Markopoulos, Boris E. R. de Ruyter, Wendy E....
FTDCS
1997
IEEE
13 years 11 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
CHI
2009
ACM
14 years 8 months ago
An elementary social information foraging model
User interfaces and information systems have become increasingly social in recent years, aimed at supporting the decentralized, cooperative production and use of content. A theory...
Peter Pirolli