Sciweavers

CSREASAM
2007
13 years 9 months ago
An Efficient Authentication Protocol for GSM
Ashutosh Saxena, Shailaja Gummadidala, Phani Kumar...
ACSW
2007
13 years 9 months ago
Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research
An infrastructure for remote instrument access, data acquisition and data management is being developed for e-Research. The Common Instrument Middleware Architecture (CIMA) is bei...
Ian M. Atkinson, Douglas du Boulay, Clinton Chee, ...
ACSW
2007
13 years 9 months ago
Autonomic System Management in Mobile Grid Environments
Mobile device integration in grid environments is a challenge for many researchers. Due to the transient nature of mobile devices, service management is a critical, but often over...
Michael Messig, Andrzej Goscinski
ACSW
2007
13 years 9 months ago
Hospital Management Knowledge Discovery using Discrete Event Simulation
Christopher A. Bain, Gitesh K. Raikundalia, Snehal...
ACSW
2007
13 years 9 months ago
DGRID: A DHT-Based Resource Indexing and Discovery Scheme for Computational Grids
Traditional DHT (Distributed Hash Tables) abstraction distributes data items among peer nodes on a structured overlay network. This introduces a number of issues when nodes are un...
Verdi March, Yong Meng Teo, Xianbing Wang
ACSW
2007
13 years 9 months ago
Usability and Privacy in Identity Management Architectures
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of ...
Audun Jøsang, Mohammed Al Zomai, Suriadi Su...
ACSW
2007
13 years 9 months ago
YourSRB: A cross platform interface for SRB and Digital Libraries
Mathew J. Wyatt, Nigel G. D. Sim, Dianna L. Hardy,...
ACSW
2007
13 years 9 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...
ACSW
2007
13 years 9 months ago
The motivation and proposition of a privacy-enhancing architecture for operational databases
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such...
Kirsten Wahlstrom, Gerald Quirchmayr