Sciweavers

2061 search results - page 222 / 413
» Authorization for Metacomputing Applications
Sort
View
EUROCRYPT
2005
Springer
15 years 10 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
160
Voted
EUROSEC
2010
ACM
15 years 10 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
136
Voted
DEXAW
2003
IEEE
137views Database» more  DEXAW 2003»
15 years 10 months ago
Applying the Semantic Web Layers to Access Control
The Semantic Web, also known as the Web of meaning, is considered the new generation of the Web. Its objective is to enable computers and people to work in cooperation. A requisit...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
151
Voted
CW
2002
IEEE
15 years 9 months ago
Adaptive Content Model for Multimedia Presentation
Multimedia presentation systems require flexible support for the modeling of multimedia content models. Many presentation systems provide the synchronized, sequential or concurren...
L. Y. Deng, R.-X. Chen, R.-C. Chang, T.-S. Huang
EUROMICRO
2002
IEEE
15 years 9 months ago
Comparing JavaBeans and OSGi Towards an Integration of Two Complementary Component Models
In today's software engineering practices, building applications from components is the ongoing trend. What can be noticed however is that there really is not a clear consens...
Humberto Cervantes, Jean-Marie Favre