Sciweavers

379 search results - page 29 / 76
» The Need for Declarative Security Mechanisms
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 9 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
WICSA
2001
13 years 9 months ago
A Compositional Approach for Constructing Connectors
Increasingly, systems are composed from independently developed parts, and mechanisms that allow those parts to interact (connectors). In many situations, specialized forms of int...
Bridget Spitznagel, David Garlan
HUMAN
2003
Springer
14 years 1 months ago
A Framework of Winner Determination Algorithms for Internet Auctions
Auctions have become popular in conducting trade negotiations on the Internet. The design of new auction formats and other negotiation protocols has become an important topic for r...
Juhnyoung Lee, Sang-goo Lee, Suekyung Lee
ER
1999
Springer
160views Database» more  ER 1999»
14 years 22 days ago
Developing an Object-Oriented Video Database System with Spatio-Temporal Reasoning Capabilities
Video data management (VDM) is fast becoming one of seminar topics in multimedia information systems. In VDM systems, there exists an important need for novel techniques and mechan...
Shermann S.-M. Chan, Qing Li
MOBIMEDIA
2007
13 years 10 months ago
AAA and mobile networks: security aspects and architectural efficiency
Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day by day, the number of subscribers is increased by an exponent...
Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Ko...