• No results found

Identity and Authority

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

... settings. Identity-based encryption (IBE) could be a public key ...into Identity-based ...revocation authority (CRA) to unravel the two shortcomings, For security analysis, we have a tendency to ...

5

Cultural Catholics in America : narrative, authority and identity since Vatican II

Cultural Catholics in America : narrative, authority and identity since Vatican II

... institutional authority by her family ...the authority of the local parish priest, who was for the Church the sole intermediary between the people and the ...ethnic identity as noted in chapter ...

229

An identity based Encryption by using Robust Generic Multi-Authority Attributes Management System for Cloud Storage Services

An identity based Encryption by using Robust Generic Multi-Authority Attributes Management System for Cloud Storage Services

... Every AA is an independent attribute authority that is responsible for entitling and revoking user’s attributes according to their role or identity in its domain. In our scheme, every attribute is ...

5

Identity-Based Encryption Using Multi-Authority in Cloud Computing

Identity-Based Encryption Using Multi-Authority in Cloud Computing

... multi-authority identity based signature schema without using a global authority and propose a multi-authority access control scheme for cloud storage ...global authority, existing ...

5

Political authority, practical identity, and binding citizens

Political authority, practical identity, and binding citizens

... has authority in the sense of being able to create binding obligations for its citizens, so long as it is morally justified in wielding political ...state authority can greatly enhance autonomy as it ...

29

Cloud Revocation Authority and Its Applications Throw Encryption On Identity-Based

Cloud Revocation Authority and Its Applications Throw Encryption On Identity-Based

... gatherer's identity and gift-day term to encode messages whilst he doled out beneficiary translates the parent content making use of the overall non-public ...

6

The Shaping of German Identity: Authority and Crisis, 1245–1414

The Shaping of German Identity: Authority and Crisis, 1245–1414

... of identity deriving from their belonging to the empire, the Reich was of course a concept that embraced lands far beyond just the German ones, and indeed, what was perhaps most special about the emperor was ...

6

‘You have to keep your head on your shoulders’: A systems psychodynamic perspective on women leaders

‘You have to keep your head on your shoulders’: A systems psychodynamic perspective on women leaders

... Professional identity is not the focus of women leaders connected to the low levels of experienced and perceived authority at ...of authority, control and influence, connecting them to their own ...

15

The politics of planning :  a case study : the Christchurch Master Transportation Plan

The politics of planning : a case study : the Christchurch Master Transportation Plan

... Committee, {which retained its identity in a letter to the meeting recomnended that the City Council should have four representatives on the Regional Planning Authority, that one of thes[r] ...

182

Introduction: Resituating Canadian Early Childhood Education

Introduction: Resituating Canadian Early Childhood Education

... Educator’s Authority for the Advance- ment of Social Goods,” Rachel Langford opens the early childhood educator’s dominant identity for ...lacking authority. Historical notions of authority ...

5

Secure reprogramming protocol using hybrid approach for  wireless sensor networks

Secure reprogramming protocol using hybrid approach for wireless sensor networks

... many authority nodes. This authority node then performs the reprogramming process on sensor ...the authority nodes will take over the whole network and act like a base ...a authority node and ...

5

The competence of the authority municipio, national directorate for land and property registry services and the role of the national cadastral System

The competence of the authority municipio, national directorate for land and property registry services and the role of the national cadastral System

... behavior, but it is quite a statement of relations within and between the relevant amounts of that organization. An effective organization is one that can report on itself and its activities in ways in which these ...

15

Computerized National Identify Card, NADRA KIOSKs and its prospects

Computerized National Identify Card, NADRA KIOSKs and its prospects

... National Identity Cards (CNIC), National Database and Registration Authority (NADRA) KIOSKs, NADRA Swift Registration Centers (NSRCs) and their working mode of payments and prospects in civic life at ...

6

Sentementes_unc_0153D_18925.pdf

Sentementes_unc_0153D_18925.pdf

... party identity is chronically salient and accessible when citizens process political information (Greene, ...have authority over social welfare issues, while Republicans are seen as better equipped to ...

176

Authority Cloud Data Manage and Social Security Using Identity-Based Encryption

Authority Cloud Data Manage and Social Security Using Identity-Based Encryption

... is identity anonymity security control based on users’ identity file Our system is consider up to N − 2 authority compromise which is highly security especially in Internet-based cloud computing ...

5

4951.pdf

4951.pdf

... as identity salience is the readiness or propensity to act on an identity in a specific situation (Ervin and Stryker 2001:34), in choosing religion as the moral authority to which they would look in ...

52

A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System

A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System

... M. Franklin, D. Bonch [4] in 2001 introduced an identity based encryption scheme. In IBE, data is encrypted using an arbitrary string as the key and for decryption; a decryption key is mapped to the arbitrary ...

7

It wasn't me, it was my festival me : the effect of event stimuli on attendee identity formation

It wasn't me, it was my festival me : the effect of event stimuli on attendee identity formation

... Heeding these suggestions, an interpretive paradigm is adopted which allows for engagement with theoretical constructs and an understanding of attendees’ identities in situ (Silverman, 2010). To understand such ...

51

The challenges of identity work: Developing Ricoeurian narrative identity in organisations

The challenges of identity work: Developing Ricoeurian narrative identity in organisations

... requires identity work, an adjustment as we understand our relation to our role and all that it ...social identity (Hogg and Terry, 2000; Kreiner et ...

18

A Renewal Authority?

A Renewal Authority?

... commercial zones, as well as for homes in residential zones, can provide economically and on a pedestrian scale in many cases local, social amenities and cultural and recreational faci[r] ...

8

Show all 10000 documents...

Related subjects