Sciweavers

649 search results - page 20 / 130
» Enabling Public Discourse
Sort
View
WSFM
2007
Springer
14 years 1 months ago
From Public Views to Private Views - Correctness-by-Design for Services
Service orientation is a means for integrating across diverse systems. Each resource, whether an application, system, or trading partner, can be accessed as a service. The resultin...
Wil M. P. van der Aalst, Niels Lohmann, Peter Mass...
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 19 days ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
EUROMICRO
2009
IEEE
13 years 11 months ago
Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes
Cloud computing uses virtualization technologies to offer a non-shared use rental of computer resources with publicly accessible worker nodes. However, unlike Grid computing, Cloud...
Matthias Schmidt, Niels Fallenbeck, Matthew Smith,...
CCS
2006
ACM
13 years 11 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
ASIACRYPT
2003
Springer
13 years 11 months ago
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. F...
Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee