Sciweavers

411 search results - page 17 / 83
» User Authentication in Multidatabase Systems
Sort
View
NGITS
1993
Springer
13 years 11 months ago
AMOS - An Architecture for Active Mediators
AMOS (Active Mediators Object System) is an architecture to model, locate, search, combine, update, and monitor data in information systems with many work stations connected using...
Gustav Fahl, Tore Risch, Martin Sköld
C5
2004
IEEE
13 years 11 months ago
Design for an Extensible Croquet-Based Framework to Deliver a Persistent, Unified, Massively Multi-User, and Self-Organizing Vir
We describe a design for a collaborative Virtual Learning Environment (VLE) to support massively multi-user and multi-institutional learning communities. This architecture extends...
Mark P. McCahill, Julian Lombardi
SC
2009
ACM
14 years 8 days ago
Enhancing the earth system grid security infrastructure through single sign-on and autoprovisioning
In this paper, we discuss the recent ESG’s development and implementation efforts concerning its authentication infrastructure. ESG’s requirements are to make the user’s log...
Frank Siebenlist, Rachana Ananthakrishnan, David E...
IJNSEC
2008
81views more  IJNSEC 2008»
13 years 7 months ago
A Self-Concealing Mechanism for Authentication of Portable Communication Systems
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove his/her identity via a secret shared...
Wei-Bin Lee, Chang-Kuo Yeh
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 7 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang