Sciweavers

1612 search results - page 180 / 323
» About models of security protocols
Sort
View
89
Voted
USITS
1997
14 years 11 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
98
Voted
WETICE
2003
IEEE
15 years 3 months ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
99
Voted
IFIP
2007
Springer
15 years 4 months ago
A Reputation-Based Approach for Securing Vivaldi Embedding System
Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applic...
Damien Saucez, Benoit Donnet, Olivier Bonaventure
OTM
2004
Springer
15 years 3 months ago
Engineering an Ontology of Financial Securities Fraud
Abstract. This paper discusses the approach of ontology-based knowledge engineering in FF POIROT, a project to explore the use of ontology technology in information systems against...
Gang Zhao, John Kingston, Koen Kerremans, Frederic...
86
Voted
KBSE
2003
IEEE
15 years 3 months ago
A Programmable Client-Server Model: Robust Extensibility via DSLs
The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
Charles Consel, Laurent Réveillère