Sciweavers

422 search results - page 30 / 85
» Risk management for distributed authorization
Sort
View
JODI
2010
115views more  JODI 2010»
13 years 3 months ago
ICE-Theorem - End to end semantically aware eResearch infrastructure for theses
: ICE-TheOREM was a project which made several important contributions to the repository domain, promoting deposit by integrating the repository with authoring workflows and enhanc...
Peter Sefton, Jim Downing
COOPIS
2003
IEEE
14 years 1 months ago
Static Type-Inference for Trust in Distributed Information Systems
Abstract. Decision-makers in critical fields such as medicine and finance make use of a wide range of information available over the Internet. Mediation, a data integration techn...
Premkumar T. Devanbu, Michael Gertz, Brian Toone
RTCSA
2005
IEEE
14 years 2 months ago
A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems
Context aware middleware infrastructures have traditionally been implemented with a modular approach to allow different components to work cooperatively and supply context synthes...
Saad Liaquat Kiani, Maria Riaz, Yonil Zhung, Sungy...
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
Reducing Trust in the PKG in Identity Based Cryptosystems
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Vipul Goyal
CHI
2005
ACM
14 years 9 months ago
Distributed display environments
Augmented reality makes it possible to visualize information directly within the context of the real world by overlaying virtual graphics. We use the term view management to refer...
Dugald Ralph Hutchings, John T. Stasko, Mary Czerw...