Sciweavers

393 search results - page 8 / 79
» Security Architectures for Controlled Digital Information Di...
Sort
View
JCDL
2009
ACM
115views Education» more  JCDL 2009»
14 years 1 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
ACSW
2007
13 years 8 months ago
Usability and Privacy in Identity Management Architectures
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of ...
Audun Jøsang, Mohammed Al Zomai, Suriadi Su...
JCDL
2005
ACM
162views Education» more  JCDL 2005»
14 years 27 days ago
Integrating digital libraries and electronic publishing in the DART project
The Digital Anthropology Resources for Teaching (DART) project integrates the content acquisition and cataloging initiatives of a federated digital repository with the development...
Gordon Dahlquist, Brian Hoffman, David Millman
IJACTAICIT
2010
176views more  IJACTAICIT 2010»
13 years 4 months ago
A Secured Web Services Based E-Commerce Model for SMME Using Digital Identity
This paper deals with redesigning the existing e-commerce architecture that has provided a platform for the large companies to sell their products so that it can provide a place o...
Ashwin B. K., Kumaran K., Madhu Vishwanatham V., M...
ITRUST
2005
Springer
14 years 25 days ago
Security and Trust in the Italian Legal Digital Signature Framework
Abstract. The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities. In this paper we describe each of...
Stefano Zanero