Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Communication structure is a way of improving the effectiveness of group communications by coordinating group members’ individual efforts. This study investigates the use of Del...
Abstract. This paper presents several engineering applications that involve distributed software services. Due to the complexity of these applications, an efficient and flexible se...
The potential of Computer-Mediated Communication (CMC) to enable new forms of social interaction and foster democratisation of decision making has raised much interest but has bee...