Sciweavers

72 search results - page 6 / 15
» Federated Collaborations with Exertions
Sort
View
DAMON
2006
Springer
13 years 11 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
IDTRUST
2010
ACM
13 years 6 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
14 years 1 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich
ICSE
2001
IEEE-ACM
13 years 12 months ago
David L. Parnas Symposium
David L. Parnas is one of the grandmasters of software engineering. His academic research and industrial collaborations have exerted far-reaching influence on software design and ...
Daniel Hoffman, David M. Weiss
OSS
2007
Springer
14 years 1 months ago
Open Source Collaboration for Fostering Off-The-Shelf Components Selection
Abstract. The use of Off-The-Shelf software components in ComponentBased Development implies many challenges. One of them is the lack of available and well-suited data to support s...
Claudia P. Ayala, Carl-Fredrik Sørensen, Re...