Sciweavers

1139 search results - page 90 / 228
» Trust Management Survey
Sort
View
IJMI
2002
142views more  IJMI 2002»
13 years 8 months ago
Quality assured trusted third parties for deploying secure internet-based healthcare applications
In this paper we present a complete reference framework for the provision of quality assured Trusted Third Party (TTP) services within a medical environment. The main objective is...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
TGC
2005
Springer
14 years 1 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
C5
2004
IEEE
14 years 11 hour ago
Design for an Extensible Croquet-Based Framework to Deliver a Persistent, Unified, Massively Multi-User, and Self-Organizing Vir
We describe a design for a collaborative Virtual Learning Environment (VLE) to support massively multi-user and multi-institutional learning communities. This architecture extends...
Mark P. McCahill, Julian Lombardi
ICMB
2006
IEEE
206views Business» more  ICMB 2006»
14 years 2 months ago
E-Pass Using DRM in Symbian v8 OS and TrustZone : Securing Vital Data on Mobile Devices
The mobile phone industry has established a large customer base market, providing a wide range of mobile applications from voice and data services to digital media such as digital...
Wan Huzaini Wan Hussin, Reuben Edwards, Paul Coult...
SAC
2009
ACM
14 years 3 months ago
Eliciting required characteristics for usable requirements engineering approaches
It has been reported that many software companies do not use existing requirements engineering approaches. This indicates that there is room and opportunity for improving the usab...
Kristina Winbladh, Hadar Ziv, Debra J. Richardson