Sciweavers

234 search results - page 40 / 47
» Evolving Messaging Systems for Secure Role Based Messaging
Sort
View
IACR
2011
89views more  IACR 2011»
12 years 7 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
14 years 1 months ago
Challenges of Adopting Web Services: Experiences from the Financial Industry
Despite the many expected benefits of Web services technology, some organizations are hesitating to adopt Web services on a larger scale and across their organizational boundaries...
Andrew P. Ciganek, Marc N. Haines, William (Dave) ...
CSAC
2004
13 years 9 months ago
Coordination practices within FLOSS development teams: The bug fixing process
Free/Libre Open Source Software (FLOSS) is primarily developed by distributed teams. Developers contribute from around the world and coordinate their activity almost exclusively by...
Kevin Crowston, Barbara Scozzi
PVLDB
2010
129views more  PVLDB 2010»
13 years 6 months ago
AXART - Enabling Collaborative Work with AXML Artifacts
The workflow models have been essentially operation-centric for many years, ignoring almost completely the data aspects. Recently, a new paradigm of data-centric workflows, call...
Bogdan Marinoiu, Serge Abiteboul, Pierre Bourhis, ...
AHSWN
2006
206views more  AHSWN 2006»
13 years 7 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch