Sciweavers

210 search results - page 38 / 42
» Policy Compliance in Collaborative Systems
Sort
View
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
14 years 5 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
GECCO
2004
Springer
179views Optimization» more  GECCO 2004»
14 years 4 months ago
An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System
Abstract. The need for supporting CSCW applications with heterogeneous and varying user requirements calls for adaptive and reconfigurable schedulers accommodating a mixture of re...
Horst Wedde, Muddassar Farooq, Mario Lischka
WETICE
2003
IEEE
14 years 4 months ago
WebDAVA: An Administrator-Free Approach To Web File-Sharing
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to de...
Alexander Levine, Vassilis Prevelakis, John Ioanni...
CCS
2007
ACM
14 years 5 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
ICDE
2002
IEEE
143views Database» more  ICDE 2002»
15 years 6 days ago
Declarative Composition and Peer-to-Peer Provisioning of Dynamic Web Services
The development of new services through the integration of existing ones has gained a considerable momentum as a means to create and streamline business-to-business collaborations...
Boualem Benatallah, Quan Z. Sheng, Anne H. H. Ngu,...