Sciweavers

464 search results - page 69 / 93
» Identity Management for Self-Portrayal
Sort
View
TNC
2004
146views Education» more  TNC 2004»
13 years 9 months ago
Connective Middleware for Voice and Integrated Communications
To engage Internet2 users in an exploration of peer-to-peer, real-time communications, these users require connectivity. Superior networking connectivity alone is not sufficient. ...
Ben Teitelbaum
BPM
2008
Springer
130views Business» more  BPM 2008»
13 years 10 months ago
BPM and Social Software
Due to many success stories, social software received much attention in public and academia. Although it is widely used for business support, its relationship with business proces...
Rainer Schmidt, Selmin Nurcan
TPDS
2008
116views more  TPDS 2008»
13 years 8 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
VLDB
1990
ACM
126views Database» more  VLDB 1990»
14 years 14 days ago
Consistency of Versions in Object-Oriented Databases
This paper presents an approach to maintaining consistency of object versions in multiversion database systems. In this approach a multiversion database is considered to be a set ...
Wojciech Cellary, Geneviève Jomier
ESAS
2006
Springer
14 years 3 days ago
Cryptographic Protocol to Establish Trusted History of Interactions
In the context of ambient networks, this article describes a cryptographic protocol called Common History Extraction (CHE) protocol implementing a trust management framework. All t...
Samuel Galice, Marine Minier, John Mullins, St&eac...