Sciweavers

222 search results - page 38 / 45
» Towards Flexible Authorization Management
Sort
View
CHI
2010
ACM
14 years 9 days ago
Informal interactions in nonprofit networks
Nonprofit organizations often need to excel in coordinating with other organizations and must do so in a variety of contexts and levels from the informal to the formal. Their abil...
Jennifer Stoll, W. Keith Edwards, Elizabeth D. Myn...
ICDIM
2007
IEEE
13 years 10 months ago
Predicting durability in DHTs using Markov chains
We consider the problem of data durability in lowbandwidth large-scale distributed storage systems. Given the limited bandwidth between replicas, these systems suffer from long re...
Fabio Picconi, Bruno Baynat, Pierre Sens
CN
2007
172views more  CN 2007»
13 years 9 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
COMPUTER
2004
120views more  COMPUTER 2004»
13 years 8 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
CHI
2010
ACM
13 years 8 months ago
"Who's scribing?": documenting patient encounter during trauma resuscitation
With healthcare moving towards electronic health records, it is important to understand existing work practices to design effective systems. We conducted an observational study in...
Aleksandra Sarcevic