Sciweavers

9 search results - page 1 / 2
» Schematizing Trust in Named Data Networking
Sort
View
WWW
2004
ACM
14 years 6 months ago
Using context- and content-based trust policies on the semantic web
The current discussion about a future Semantic Web trust architecture is focused on reputational trust mechanisms based on explicit trust ratings. What is often overlooked is the ...
Christian Bizer, Radoslaw Oldakowski
GLOBECOM
2008
IEEE
13 years 11 months ago
MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet
— Naming and addressing are important issues for Next Generation Internet (NGI). In this paper, we discuss a new Mobility and Multihoming supporting Identifier Locator Split Arch...
Jianli Pan, Subharthi Paul, Raj Jain, Mic Bowman
NCA
2009
IEEE
14 years 1 days ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman
DIM
2009
ACM
13 years 12 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
PERCOM
2004
ACM
14 years 4 months ago
"Yoking-Proofs" for RFID Tags
RFID (Radio-Frequency Identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility i...
Ari Juels