Sciweavers

5252 search results - page 872 / 1051
» Logic in Access Control
Sort
View
PERVASIVE
2004
Springer
15 years 9 months ago
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity
Ensuring authenticity and integrity are important tasks when dealing with goods. While in the past seal wax was used to ensure the integrity, electronic devices are now able to tak...
Christian Decker, Michael Beigl, Albert Krohn, Phi...
PERVASIVE
2004
Springer
15 years 9 months ago
Accommodating Transient Connectivity in Ad Hoc and Mobile Settings
Much of the work on networking and communications is based on the premise that components interact in one of two ways: either they are connected via a stable wired or wireless netw...
Radu Handorean, Christopher D. Gill, Gruia-Catalin...
POLICY
2004
Springer
15 years 9 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
SEMWEB
2004
Springer
15 years 9 months ago
SemanticOrganizer: A Customizable Semantic Repository for Distributed NASA Project Teams
SemanticOrganizer is a collaborative knowledge management system designed to support distributed NASA projects, including multidisciplinary teams of scientists, engineers, and acci...
Richard M. Keller, Daniel C. Berrios, Robert E. Ca...
WEBI
2004
Springer
15 years 9 months ago
Mining Local Data Sources For Learning Global Cluster Models
— Distributed data mining has recently caught a lot of attention as there are many cases where pooling distributed data for mining is probibited, due to either huge data volume o...
Chak-Man Lam, Xiaofeng Zhang, William Kwok-Wai Che...