Sciweavers

466 search results - page 79 / 94
» Practical declarative network management
Sort
View
ITICSE
2005
ACM
14 years 1 months ago
Teaching software engineering through game design
Many projects currently used in Software Engineering curricula lack both the “fun factor” needed to engage students, as well as the practical realism of engineering projects t...
Kajal T. Claypool, Mark Claypool
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
14 years 1 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...
POLICY
2004
Springer
14 years 1 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
POLICY
2004
Springer
14 years 1 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
ICALT
2003
IEEE
14 years 28 days ago
Mobile Learning: A New Paradigm in Electronic Learning
As mobile phone becomes popular in the society and many people can afford the cost, the demand of mobility is extended to teaching and learning purposes. One recent and significan...
Chi-Hong Leung, Yuen-Yan Chan