Sciweavers

1117 search results - page 125 / 224
» A Compliance Model of Trust
Sort
View
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 2 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
WECWIS
1999
IEEE
102views ECommerce» more  WECWIS 1999»
15 years 6 months ago
Monitoring and Prediction of Network Performance
Analysis of network and application pegormance is traditionally based on mathematical models derived from first principles. Such models are usually complex, diflcult to use, and d...
Bjorn Frogner, Alexander B. Cannara
JCS
2002
118views more  JCS 2002»
15 years 1 months ago
Verified Formal Security Models for Multiapplicative Smart Cards
We present two generic formal security models for operating systems of multiapplicative smart cards. The models formalize the main security aspects of secrecy, integrity, secure co...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...
ATAL
2007
Springer
15 years 8 months ago
Exchanging reputation values among heterogeneous agent reputation models: an experience on ART testbed
In open MAS it is often a problem to achieve agents' interoperability. The heterogeneity of its components turns the establishment of interaction or cooperation among them in...
Anarosa Brandão, Laurent Vercouter, Sara J....
SACMAT
2010
ACM
15 years 6 months ago
A model of triangulating environments for policy authoring
Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
Kathi Fisler, Shriram Krishnamurthi