Sciweavers

6137 search results - page 32 / 1228
» Securing Collaborative Applications
Sort
View
ACSAC
2000
IEEE
13 years 12 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
IWAN
1999
Springer
13 years 11 months ago
The Impact of Active Networks on Established Network Operators
A collaborative case based study has established that Active Networks will have a very significant impact on Network operators. Active Networking appears to be the only route to a...
Arto Juhola, Ian Marshall, Stefan Covaci, Thomas V...
ICDCS
2002
IEEE
14 years 15 days ago
Design of a Policy-Driven Middleware for Secure Distributed Collaboration
We present here the execution model of a policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification m...
Anand R. Tripathi, Tanvir Ahmed, Richa Kumar, Shre...
PERCOM
2010
ACM
13 years 6 months ago
Service-based development of mobile real-time collaboration applications for Social Networks
—Social Networks will unfold their full potential when connected people are enabled to collaborate - any time, appropriate to the current location, activity and computing environ...
Daniel Schuster, Thomas Springer, Alexander Schill
ICALT
2008
IEEE
14 years 2 months ago
Designing Collaborative Learning Applications
Future collaborative learning technologies are characterized by the CSCL community as highly malleable and flexible. A promising approach for meeting these expectations is to use ...
Jacques Lonchamp