Sciweavers

989 search results - page 101 / 198
» An information-based model for trust
Sort
View
70
Voted
DASFAA
2009
IEEE
151views Database» more  DASFAA 2009»
15 years 6 months ago
The Challenge of Assuring Data Trustworthiness
Abstract. With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institution...
Elisa Bertino, Chenyun Dai, Murat Kantarcioglu
DEXAW
2003
IEEE
98views Database» more  DEXAW 2003»
15 years 4 months ago
Amending P3P for Clearer Privacy Promises
The Platform for Privacy Preferences (P3P) can be a viable tool for organizations to clarify their privacy promises. In this paper, we summarize our experiences and describe some ...
Günter Karjoth, Matthias Schunter, Els Van He...
SAINT
2003
IEEE
15 years 4 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
COMSWARE
2008
IEEE
15 years 28 days ago
Collaborative group membership and access control for JXTA
Abstract-- This paper presents a proposal for group membership and access control services for JXTA, both based on the principle of self-organization and collaboration of peer grou...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
COMPSEC
2000
112views more  COMPSEC 2000»
14 years 11 months ago
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
paper, the unified, abstract KEYSTONE Public Key Infrastructure is presented.This architecture consists of a reference model, a functional architecture specification, and a set of ...
Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrio...