Sciweavers

989 search results - page 76 / 198
» An information-based model for trust
Sort
View
USS
2010
14 years 9 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
WEBI
2010
Springer
14 years 9 months ago
Let's Trust Users It is Their Search
The current search engine model considers users not trustworthy, so no tools are provided to let them specify what they are looking for or in what context, which severely limits wh...
Pavel Kalinov, Bela Stantic, Abdul Sattar
SACMAT
2003
ACM
15 years 4 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
WWW
2005
ACM
15 years 11 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
ATAL
2004
Springer
15 years 4 months ago
Trust-Based Mechanism Design
We define trust-based mechanism design as an augmentation of traditional mechanism design in which agents take into account the degree of trust that they have in their counterpar...
Rajdeep K. Dash, Sarvapali D. Ramchurn, Nicholas R...