Sciweavers

5210 search results - page 90 / 1042
» Computing Capabilities of Mediators
Sort
View
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
14 years 1 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
POLICY
2004
Springer
14 years 1 months ago
A Decentralized Treatment of a Highly Distributed Chinese-Wall Policy
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Naftaly H. Minsky
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 1 months ago
The Impacts of Delphi Communication Structure on Small and Medium Sized Asynchronous Groups: Preliminary Results
Communication structure is a way of improving the effectiveness of group communications by coordinating group members’ individual efforts. This study investigates the use of Del...
Hee-Kyung Cho, Murray Turoff, Starr Roxanne Hiltz
GCC
2003
Springer
14 years 28 days ago
On-Demand Services Composition and Infrastructure Management
Abstract. This paper presents several engineering applications that involve distributed software services. Due to the complexity of these applications, an efficient and flexible se...
Jun Peng, Jie Wang
HICSS
2000
IEEE
149views Biometrics» more  HICSS 2000»
14 years 4 days ago
CMC and the Question of Democratisation: A University Field Study
The potential of Computer-Mediated Communication (CMC) to enable new forms of social interaction and foster democratisation of decision making has raised much interest but has bee...
Dubravka Cecez-Kecmanovic, Lesley Treleaven, Debra...