Sciweavers

1117 search results - page 132 / 224
» A Compliance Model of Trust
Sort
View
COOTS
1998
15 years 3 months ago
Mobile Objects and Agents (MOA)
This paper describes the design and implementation of the Mobile Objects and Agents (MOA) project at the Open Group Research Institute. MOA was designed to support migration, comm...
Dejan S. Milojicic, William LaForge, Deepika Chauh...
ECOOP
2005
Springer
15 years 7 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
DASFAA
2009
IEEE
151views Database» more  DASFAA 2009»
15 years 8 months ago
The Challenge of Assuring Data Trustworthiness
Abstract. With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institution...
Elisa Bertino, Chenyun Dai, Murat Kantarcioglu
94
Voted
DEXAW
2003
IEEE
98views Database» more  DEXAW 2003»
15 years 7 months ago
Amending P3P for Clearer Privacy Promises
The Platform for Privacy Preferences (P3P) can be a viable tool for organizations to clarify their privacy promises. In this paper, we summarize our experiences and describe some ...
Günter Karjoth, Matthias Schunter, Els Van He...
SAINT
2003
IEEE
15 years 7 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta