Sciweavers

296 search results - page 57 / 60
» Policies and Roles in Collaborative Applications
Sort
View
ACSAC
2000
IEEE
14 years 8 days ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
ISPE
2003
13 years 9 months ago
Task-oriented engineering of coordinated software systems
ABSTRACT: In the context of Internet-based applications where heterogeneous, legacy entities should integrate and cooperate, the efficiency of the software production process is a ...
Enrico Denti, Andrea Omicini, Alessandro Ricci
AC
2008
Springer
13 years 8 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos
GECCO
2008
Springer
135views Optimization» more  GECCO 2008»
13 years 9 months ago
Agent-based support for interactive search in conceptual software engineering design
While recent attempts to search a conceptual software engineering design search space with multi-objective evolutionary algorithms have yielded promising results, the practical ap...
Christopher L. Simons, Ian C. Parmee
SACMAT
2011
ACM
12 years 10 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali