Sciweavers

152 search results - page 13 / 31
» A Reputation-based Trust Management in Peer-to-Peer Network ...
Sort
View
CSE
2008
IEEE
15 years 4 months ago
A Trust Model Applied to E-mail Servers
E-mail services are essential in the Internet. However, the basic e-mail architecture presents problems that opens it to several threats. Alternatives have been proposed to solve ...
Leonardo de Oliveira, Carlos Maziero
PERCOM
2006
ACM
15 years 9 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
SACMAT
2004
ACM
15 years 3 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
85
Voted
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 3 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
SACMAT
2006
ACM
15 years 4 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...