Sciweavers

422 search results - page 31 / 85
» Risk management for distributed authorization
Sort
View
ISI
2008
Springer
13 years 9 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 3 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
CCS
2009
ACM
14 years 10 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
ESAS
2007
Springer
14 years 4 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
CSCW
2010
ACM
14 years 6 months ago
Sources of errors in distributed development projects: implications for collaborative tools
An important dimension of success in development projects is the quality of the new product. Researchers have primarily concentrated on developing and evaluating processes to redu...
Marcelo Cataldo