Sciweavers

464 search results - page 72 / 93
» Identity Management
Sort
View
ITRUST
2005
Springer
14 years 1 months ago
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, th...
Jean-Marc Seigneur, Alan Gray, Christian Damsgaard...
SAC
2004
ACM
14 years 1 months ago
Missing requirements and relationship discovery through proxy viewpoints model
This paper addresses the problem of “missing requirements” in software requirements specification (SRS) expressed in natural language. Due to rapid changes in technology and b...
Seok Won Lee, David C. Rine
EUC
2004
Springer
14 years 1 months ago
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags
A Radio-Frequency-Identification (RFID) tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. It emits an ID in response to a query...
Junichiro Saito, Jae-Cheol Ryou, Kouichi Sakurai
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
14 years 29 days ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
IEEEICCI
2003
IEEE
14 years 28 days ago
Conceptual Framework for Interactive Ontology Building
Abstract— An ontology is a formal language adequately representing the knowledge used for reasoning in a specific environment. When contradictions arise and make ontologies inad...
Jean Sallantin, Jacques Divol, Patrice Duroux