Sciweavers

739 search results - page 93 / 148
» Information Flow in Credential Systems
Sort
View
EUROPKI
2009
Springer
13 years 5 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
DASIP
2010
13 years 2 months ago
Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation
This paper proposes an automatic design flow from userfriendly design to efficient implementation of video processing systems. This design flow starts with the use of coarsegrain ...
Ruirui Gu, Jonathan Piat, Mickaël Raulet, J&o...
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
14 years 2 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
SIGCOMM
2010
ACM
13 years 8 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
HICSS
2003
IEEE
148views Biometrics» more  HICSS 2003»
14 years 1 months ago
Strategies for the Successful Implementation of Workflow Systems within Healthcare: A Cross Case Comparison
The implementation of computerized workflow systems to support the collection and dissemination of patient information has been an area of focus in healthcare for many years. This...
Meg Murray