Sciweavers

401 search results - page 10 / 81
» Dynamic security context management in Grid-based applicatio...
Sort
View
IACR
2011
129views more  IACR 2011»
12 years 7 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
JUCS
2010
183views more  JUCS 2010»
13 years 6 months ago
User Context and Personalized Learning: a Federation of Contextualized Attention Metadata
: Nowadays, personalized education is a very hot topic in technology enhanced learning (TEL) research. To support students during their learning process, the first step consists in...
Valentin Butoianu, Philippe Vidal, Katrien Verbert...
ESCIENCE
2006
IEEE
13 years 9 months ago
Domain Based Access Control Model for Distributed Collaborative Applications
This paper describes the design and development of a flexible domain-based access control infrastructure for distributed Collaborative Environments. The paper proposes extensions ...
Yuri Demchenko, Cees de Laat, Leon Gommans, Ren&ea...
TRUSTBUS
2007
Springer
14 years 1 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson
IPCCC
2006
IEEE
14 years 1 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin