Sciweavers

859 search results - page 130 / 172
» Security for Key Management Interfaces
Sort
View
IJIEM
2010
171views more  IJIEM 2010»
13 years 8 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
MM
2005
ACM
103views Multimedia» more  MM 2005»
14 years 3 months ago
My digital photos: where and when?
In recent years digital cameras have seen an enormous rise in popularity, leading to a huge increase in the quantity of digital photos being taken. This brings with it the challen...
Neil O'Hare, Cathal Gurrin, Hyowon Lee, Noel Murph...
EUROSYS
2008
ACM
14 years 7 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
CCS
2010
ACM
13 years 10 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
CHI
2010
ACM
14 years 4 months ago
Multi-lifespan information system design: a research initiative for the hci community
This CHI Note proposes a new research initiative for the HCI community: multi-lifespan information system design. The central idea begins with the identification of categories of ...
Batya Friedman, Lisa P. Nathan