Sciweavers

270 search results - page 48 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
TCC
2004
Springer
164views Cryptology» more  TCC 2004»
14 years 25 days ago
Hierarchical Threshold Secret Sharing
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such settings, the secret is shared among a group of participants that is partitioned ...
Tamir Tassa
TMC
2010
115views more  TMC 2010»
13 years 5 months ago
Controlled Wi-Fi Sharing in Cities: A Decentralized Approach Relying on Indirect Reciprocity
—In densely populated cities, Wi-Fi networks—private or otherwise—are ubiquitous. We focus on the provision of citywide broadband communication capability to mobile users thr...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...
SIGIR
2006
ACM
14 years 1 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
CCGRID
2006
IEEE
14 years 1 months ago
Virtual Clusters for Grid Communities
A challenging issue facing Grid communities is that while Grids can provide access to many heterogeneous resources, the resources to which access is provided often do not match th...
Ian T. Foster, Timothy Freeman, Katarzyna Keahey, ...
HPDC
2005
IEEE
14 years 1 months ago
Supporting application-tailored grid file system sessions with WSRF-based services
This paper presents novel service-based Grid data management middleware that leverages standards defined by WSRF specifications to create and manage dynamic Grid file system sessi...
Ming Zhao 0002, Vineet Chadha, Renato J. O. Figuei...