Learn More
User-driven access control improves the coarse-grained access control of current operating systems (particularly in the mobile space) that provide only all-or-nothing access to a resource such as the camera or the current location. By granting appropriate permissions only in response to explicit user actions (for example, pressing a camera button),(More)
Threshold schemes provide a means through which two groups can communicate if and only if a certain number of members participate. Existing threshold schemes focus on generating a group public and secret key pair which can be used to encrypt or sign. The scheme described in this paper uses a bilinear pairing to establish a secret key that can be used by two(More)
  • T Ringer
  • 2001
This case study examines the matters of competency and informed consent in the case of a patient whose express-but potentially misguided-wishes conflict with medical opinion and the desires of the family. It considers the roles played by emotional, physical and circumstantial factors and attempts to reach a solution which is both consistent with medical(More)
  • 1