Sciweavers

248 search results - page 31 / 50
» Managing Digital Rights using Linear Logic
Sort
View
HOTOS
2003
IEEE
14 years 3 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh
SIGUCCS
2000
ACM
14 years 2 months ago
New Economy, New Partnership: New DocShare
DocShare, born at SIGUCCS User Services ’95, has gone one step further in its evolution to take advantage of the new digital economy and partnership opportunity. DocShare is a c...
Keiko Pitter, Gil Gonzales, Marian Smith
AFRICACRYPT
2010
Springer
14 years 1 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
CAD
2006
Springer
13 years 10 months ago
Meta-ontology for automated information integration of parts libraries
Seamless integration of digital parts libraries or electronic parts catalogs for e-procurement is impeded by semantic heterogeneity. The utilization of ontologies as metadata desc...
Joonmyun Cho, Soonhung Han, Hyun Kim
SIGCSE
2008
ACM
128views Education» more  SIGCSE 2008»
13 years 9 months ago
Cybercivics: a novel approach to reaching k-12 students with the social relevance of computer science
This paper describes CyberCivics, a novel approach to computer science outreach that integrates hands-on computing experiences with the study of contemporary social and political ...
Jim Owens, Jeanna Matthews