Sciweavers

232 search results - page 36 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
JAMIA
2011
68views more  JAMIA 2011»
13 years 21 days ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
CMMR
2007
Springer
174views Music» more  CMMR 2007»
14 years 4 months ago
Between Mapping, Sonification and Composition: Responsive Audio Environments in Live Performance
This paper describes recent work on a large-scale, interactive theater performance entitled Schwelle as a platform to pose critical questions around the conception, design and imp...
Christopher L. Salter, Marije A. J. Baalman, Danie...
GI
2004
Springer
14 years 3 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
DIM
2008
ACM
13 years 11 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash
CBSE
2011
Springer
12 years 9 months ago
Rectifying orphan components using group-failover in distributed real-time and embedded systems
Orphan requests are a significant problem for multi-tier distributed systems since they adversely impact system correctness by violating the exactly-once semantics of application...
Sumant Tambe, Aniruddha S. Gokhale