Sciweavers

464 search results - page 55 / 93
» Identity Management
Sort
View
ITCC
2003
IEEE
14 years 29 days ago
A Federated Model for Secure Web-Based Videoconferencing
This paper describes efforts underway within Internet2 to create a secure federated IP based videoconferencing model. The objective is to create an environment that is user-friend...
Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, ...
WPES
2003
ACM
14 years 28 days ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
ICDCSW
2002
IEEE
14 years 19 days ago
Switchboard: Secure, Monitored Connections for Client-Server Communication
Prolonged secure communication requires trust relationships that extend throughout a connection’s life cycle. Current tools to establish secure connections such as SSL/TLS and S...
Eric Freudenthal, Lawrence Port, Tracy Pesin, Edwa...
IH
2001
Springer
14 years 4 days ago
Intellectual Property Metering
Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts a...
Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak
CLUSTER
2000
IEEE
14 years 3 days ago
From Metacomputing to Metabusiness Processing
The importance of large-scale electrical business processing is increasing today as recent Internet technologies build on the basic infrastructure. Simply integrating existing tec...
Li-jie Jin, Andrew S. Grimshaw