Sciweavers

1663 search results - page 252 / 333
» Privacy and Identity Management
Sort
View
IJIEM
2010
171views more  IJIEM 2010»
15 years 2 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
ICWS
2009
IEEE
15 years 2 months ago
A Flexible Approach for Automatic Process Decentralization Using Dependency Tables
Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation points...
Walid Fdhila, Ustun Yildiz, Claude Godart
ICSNC
2007
IEEE
15 years 10 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
P2P
2005
IEEE
112views Communications» more  P2P 2005»
15 years 9 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
ER
2005
Springer
134views Database» more  ER 2005»
15 years 9 months ago
An Agent-Oriented Meta-model for Enterprise Modelling
This paper proposes an agent-oriented meta-model that provides rigorous concepts for conducting enterprise modelling. The aim is to allow analysts to produce an enterprise model th...
Ivan Jureta, Stéphane Faulkner