Sciweavers

115 search results - page 7 / 23
» A lightweight protocol for the generation and distribution o...
Sort
View
ESCIENCE
2005
IEEE
14 years 2 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
ICICS
2009
Springer
14 years 3 months ago
GUC-Secure Join Operator in Distributed Relational Database
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
Yuan Tian, Hao Zhang
ICDCS
2005
IEEE
14 years 2 months ago
Filter Based Directory Replication: Algorithms and Performance
Directories have become an important component of the enterprise security and identity management middleware. This paper describes a novel filter based replication model for Light...
Apurva Kumar
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
14 years 8 months ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...
AINA
2011
IEEE
13 years 7 days ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser