Sciweavers

3047 search results - page 290 / 610
» A Secure Distributed Search System
Sort
View
PAKM
2004
15 years 5 months ago
Knowledge Exploitation from the Web
In the framework of Knowledge Management, the Internet can be a valuable source of information to produce new Knowledge. Here, an ontologybased web search system to ease the enterp...
David Riaño, Antonio Moreno, David Isern, J...
129
Voted
WWW
2004
ACM
16 years 5 months ago
Spam attacks: p2p to the rescue
We propose a decentralized privacy-preserving approach to spam filtering. Our solution exploits robust digests to identify messages that are a slight variation of one another and ...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
CSFW
2007
IEEE
15 years 10 months ago
Do As I SaY! Programmatic Access Control with Explicit Identities
We address the programmatic realization of the access control model of security in distributed systems. Our aim is e the gap between abstract/declarative policies and their concre...
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, J...
IJCSA
2007
88views more  IJCSA 2007»
15 years 4 months ago
A New Quantitative Trust Model for Negotiating Agents using Argumentation
In this paper, we propose a new quantitative trust model for argumentation-based negotiating agents. The purpose of such a model is to provide a secure environment for agent negot...
Jamal Bentahar, John-Jules Ch. Meyer
SP
2002
IEEE
117views Security Privacy» more  SP 2002»
15 years 4 months ago
Grids: The top ten questions
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A di...
Jennifer M. Schopf, Bill Nitzberg