Sciweavers

1117 search results - page 165 / 224
» A Compliance Model of Trust
Sort
View
PET
2010
Springer
15 years 5 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
CCS
2008
ACM
15 years 3 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
WWW
2008
ACM
16 years 2 months ago
Guanxi in the chinese web - a study of mutual linking
Guanxi is a type of dyadic social interaction based on feelings ("qing") and trust ("xin"). Long studied by scholars of Chinese origin, it has recently drawn t...
Valerie King, Louis Lei Yu, Yan Zhuang
110
Voted
LCN
2008
IEEE
15 years 8 months ago
Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks
—Hyperbolic position bounding (HPB) provides a mechanism to probabilistically delimit the location of a wireless network malicious insider to a candidate area. A large scale path...
Christine Laurendeau, Michel Barbeau
122
Voted
ICIW
2007
IEEE
15 years 8 months ago
Web Service Composition Approaches: From Industrial Standards to Formal Methods
Abstract— Composition of web services is much studied to support business-to-business and enterprise application integration in e-Commerce. Current web service composition approa...
Maurice H. ter Beek, Antonio Bucchiarone, Stefania...