Sciweavers

731 search results - page 120 / 147
» Special Section on Information and Communication System Secu...
Sort
View
WPES
2005
ACM
14 years 2 months ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer
CN
1998
100views more  CN 1998»
13 years 8 months ago
Metabroker: A Generic Broker for Electronic Commerce
In traditional commerce, brokers act as middlemen between customers and providers, aggregating, repackaging and adding value to products, services or information. In the broadest ...
Steve J. Caughey, David B. Ingham, Paul Watson
HCI
2009
13 years 6 months ago
Supporting Situation Awareness in Demanding Operating Environments through Wearable User Interfaces
The military environment is changing, e.g., the operating environment is becoming more varied and demanding. Due to these challenges, new user interfaces (UIs) are required providi...
Jari Laarni, Juhani Heinilä, Jukka Häkki...
SIGCOMM
2009
ACM
14 years 3 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
CCS
2001
ACM
14 years 1 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé