Filters








1,748 Hits in 4.7 sec

SAFE: A Declarative Trust Management System with Linked Credentials [article]

Vamsi Thummala, Jeff Chase
2015 arXiv   pre-print
system.  ...  A key barrier to practical use of logical trust systems is the problem of managing proof contexts: identifying, validating, and assembling the credentials and policies that are relevant to each trust decision  ...  names to public keys.  ... 
arXiv:1510.04629v2 fatcat:5465cxr7jraspjaod63zos6bkm

Certificate Linking and Caching for Logical Trust [article]

Qiang Cao, Vamsi Thummala, Jeffrey S. Chase, Yuanjun Yao, Bing Xie
2017 arXiv   pre-print
The contribution of SAFE is to address a key barrier to practical use of logical trust: the problem of identifying, gathering, and assembling the certificates that are relevant to each trust decision.  ...  SAFE is a data-centric platform for building multi-domain networked systems, i.e., systems whose participants are controlled by different principals.  ...  ID, which is checked against the public key of the issuer who signed the certificate.  ... 
arXiv:1701.06562v1 fatcat:tb6gpk6nfnamha2qsl4ncohyv4

Redesigning enforcement in private labour regulation: Will it work?

Axel MARX, Jan WOUTERS
2016 International labour review (Print)  
More recently doubts have been expressed concerning the potential of these systems to effectively improve labor conditions in supply chains.  ...  In this context, attention turns to systems which empower stakeholders such as complaint systems. The article discusses the possibilities and constraints of these systems.  ...  Governments use private certification systems in regulatory actions and through sustainable public procurement.  ... 
doi:10.1111/j.1564-913x.2015.00040.x fatcat:sv54pu6atbaxllsf7u5s43oiem

A Survey on Blockchain Interoperability: Past, Present, and Future Trends [article]

Rafael Belchior, André Vasconcelos, Sérgio Guerreiro, Miguel Correia
2021 arXiv   pre-print
A discovery service could be 5.3.4 Discussion on Hybrid Connectors.  ...  A key challenge of blockchain-based supply chains is to interoperate with other DLT systems.  ... 
arXiv:2005.14282v3 fatcat:svd3ltjeenfsjerwa2sgwz6nzy

Autonomic Response to Distributed Denial of Service Attacks [chapter]

Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid
2001 Lecture Notes in Computer Science  
We call this the credential chain discovery problem, by contrast with the certificate chain discovery problem, which is concerned with X.509 certificates [9] .  ...  The stronger systems can be used to offload public key-based key management computations from weaker nodes.  ... 
doi:10.1007/3-540-45474-8_9 fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm

How Useful Is a Distributed Ledger for Tracking and Tracing in Supply Chains? A Systems Thinking Approach

Christian Straubert, Eric Sucky
2021 Logistics  
This practical perspective is complemented by a theoretical systems thinking perspective.  ...  Furthermore, it became evident that DLT can only be useful for supply chain tracing.  ...  If a reputable certificate authority creates correct keys, the connection between a company and a public key cannot be changed easily without it being noticed.  ... 
doi:10.3390/logistics5040075 fatcat:642h6i63ijdhvppui7bmgjscra

Computer-aided decision-making with trust relations and trust domains (cryptographic applications)

S. Kramer, R. Gore, E. Okamoto
2012 Journal of Logic and Computation  
Section 4.2) (d) Public-Key Infrastructures (cf. Section 4.3) (e) Identity-Based Cryptography (cf.  ...  We instantiate our generic trust concepts in five major cryptographic applications of trust, namely: Access Control, Trusted Third Parties, the Web of Trust, Public-Key Infrastructures and Identity-Based  ...  PKIs In PKIs, centralized certificate authorities (CAs) act as guarantors for the trustworthiness of the public key of their clients by issuing certificates that bind the public key of each client (the  ... 
doi:10.1093/logcom/exs013 fatcat:pixr2m4girbozhedfi4yg5rwxy

Efficient Intelligent Systems for Healthcare Data Management and Delivery

Dr Krishna Prasad K
2021 Zenodo  
Efficient Intelligent Systems for Healthcare Data Management and Delivery: PDF  ...  The key indicators are categorized as Containment and Closure, and Economic Response, and Health System, and Miscellaneous.  ...  provides a clear picture of measures taken by the country to contain the outbreak of COVID-19.The key indicators include the closure of schools and workplaces, travel bans, a ban on public gatherings,  ... 
doi:10.5281/zenodo.5148783 fatcat:zabqdvbnkbacrgritgzu2sedsy

Circular value creation architectures: Make, ally, buy, or laissez‐faire

Erik G. Hansen, Ferdinand Revellio
2020 Journal of Industrial Ecology  
The typology also shows that higher degrees of vertical integration enable higher degrees of loop closure (i.e., from open to closed loops) and better feedbacks into product design.  ...  For each of these existing architectures, we conducted an embedded case study in the domain of smartphones with the aim to better understand how central coordinators align with actors in the value chain  ...  The deposit system is a precondition for a high degree of loop closure.  ... 
doi:10.1111/jiec.13016 fatcat:a5u2lyirpnfd5px7q7aomy2qha

A Study on the Sense of E-Learning Communities: The European Qualification and Certification Association

Anca Draghici, Michael Reiner
2014 International Journal of Management, Knowledge and Learning  
We would like to thank all our partners and members of the ECQA community that agreed on the publication of information regarding their projects, including relevant management aspects of building and nurturing  ...  This pool consists of the following core elements: (1) Self-Assessment Portal, (2) e-Learning Platform with a discussion forum (developed with web-based public domain learning management system Moodle,  ...  Overall, the ECQA strategy has to be quality focus continued, as this is the key aspect to the ECQA's success.  ... 
doaj:fa1f73b96989492790c8bec46ae7e0e7 fatcat:zyqqnpdpczhs7fcnznywlo64t4

A Survey on Wireless Sensor Network Security [article]

Jaydip Sen
2010 arXiv   pre-print
The proposed mechanism also uses certificates to establish the legitimacy of a public key. The certificates are based on an elliptic curve scheme.  ...  In general networks, public key authentication involves a signature verification on a certificate signed by a trusted third party Certificate Authority (CA) [136] .  ... 
arXiv:1011.1529v1 fatcat:syvw3mhclfgclktanjz6ynkd7m

Security in Wireless Sensor Networks [article]

Jaydip Sen
2013 arXiv   pre-print
Current studies on security in WSNs focus on individual topics such as key management, secure routing, secure data aggregation, and intrusion detection.  ...  The proposed mechanism also uses certificates to establish the legitimacy of a public key. The certificates are based on an elliptic curve scheme.  ...  In general networks, public key authentication involves a signature verification on a certificate signed by a trusted third party certificate authority (CA) [120] .  ... 
arXiv:1301.5065v1 fatcat:b6agtqm35rebbcfbovkam2xkbu

Class Actions in the United States and Israel: A Comparative Approach

Alon Klement, Robert Klonoff
2018 Theoretical Inquiries in Law  
In the United States, wide-ranging pretrial discovery enables class counsel to explore a defendant's documents, take depositions of key witnesses, and obtain discovery from a defendant's experts.  ...  An opt-in approach drastically limits the effectiveness of the device in achieving closure.  ... 
doi:10.1515/til-2018-0006 fatcat:wbylbekvmrakthxarnyu24tp2m

A review of Canadian forest vegetation management research and practice

Dean G. Thompson, Douglas G. Pitt
2003 Annals of Forest Science  
Increasing collaboration between academia, government and industry has resulted in > 666 new scientific publications, substantially augmenting the existing knowledge base.  ...  Results indicate continued evolution toward a more integrated and ecologically sound program with appropriate focus on key competitors and crop species.  ...  scientific discoveries, and alternative harvesting practices now coming into vogue.  ... 
doi:10.1051/forest:2003060 fatcat:5jzrrxe475cfphk4mgycmwt6mi

Middle East and North African Health Informatics Association (MENAHIA)

Mahmood Tara, Taweel Adel, Alhuwail Dari, Dena A. Al Thani, Eiman Al-Jafar, Eman Abu Hamra, Hassan Ghazal, Hoda Wahba, Kambiz Bahaadinbeigy, Khalid AlKhalifa, Leena Joseph, Mohamed Zeroug (+9 others)
2021 IMIA Yearbook of Medical Informatics  
Another initiative by the MoH was the launch of telemedicine services as a response to the closure of the primary health centers after the discovery of the first COVID-19 cases.  ...  All testing stations whether at public or private facilities were all required to report using the central system.  ... 
doi:10.1055/s-0041-1726496 fatcat:k54wzk2wezba3dp6vlvbprwhwm
« Previous Showing results 1 — 15 out of 1,748 results