Sciweavers

BNCOD
2006
85views Database» more  BNCOD 2006»
13 years 6 months ago
Trust Obstacle Mitigation for Database Systems
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model...
Victor Page, Robin C. Laney, Maurice Dixon, Charle...
ISAAC
2003
Springer
97views Algorithms» more  ISAAC 2003»
13 years 9 months ago
Equilibria for Networks with Malicious Users
We consider the problem of characterizing user equilibria and optimal solutions for selfish routing in a given network. We extend the known models by considering malicious behavio...
George Karakostas, Anastasios Viglas
OTM
2009
Springer
13 years 11 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...