Sciweavers

107 search results - page 2 / 22
» A Computational Model of Trust Based on Message Content and ...
Sort
View
CCS
2006
ACM
13 years 9 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
NOMS
2006
IEEE
129views Communications» more  NOMS 2006»
13 years 11 months ago
A Framework for the Decentralisation and Management of Collaborative Applications in Ubiquitous Computing Environments
—When deploying collaborative applications such as Instant Messaging in ubiquitous computing environments significant enhancements can be afforded by offering additional context ...
Karl Quinn, Austin Kenny, Kevin Feeney, David Lewi...
SACMAT
2003
ACM
13 years 10 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
MOBIQUITOUS
2007
IEEE
13 years 11 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra
WETICE
1998
IEEE
13 years 9 months ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes