Sciweavers

422 search results - page 18 / 85
» Risk management for distributed authorization
Sort
View
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
14 years 2 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
CCGRID
2007
IEEE
14 years 2 months ago
Standardization of an API for Distributed Resource Management Systems
Today’s cluster and grid environments demand the usage of product-specific APIs and tools for developing distributed applications. We give an overview of the Distributed Resour...
Peter Tröger, Hrabri Rajic, Andreas Haas, Pio...
ACSAC
1999
IEEE
14 years 24 days ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
MOBIS
2008
13 years 10 months ago
Policy-Based Semantic Compliance Checking for Business Process Management
: Compliance management, risk analysis, and auditing are disciplines that are critical for large scale distributed enterprise systems. The way these complex systems are developed a...
Marwane El Kharbili, Sebastian Stein
ECBS
2005
IEEE
126views Hardware» more  ECBS 2005»
14 years 2 months ago
Toward Introducing Notification Technology into Distributed Project Teams
Software development can be thought of as the evolution act requirements into a concrete software system. The evolution, achieved through a successive series of elaborations and r...
Jamie L. Smith, Shawn A. Bohner, D. Scott McCricka...