Sciweavers

989 search results - page 77 / 198
» An information-based model for trust
Sort
View
78
Voted
ITRUST
2004
Springer
15 years 4 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
79
Voted
OSDI
2000
ACM
15 years 12 days ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro
LATINCRYPT
2010
14 years 9 months ago
Broadcast Encryption with Multiple Trust Authorities
Abstract. In this paper we extend the notion of hierarchical identitybased encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with mul...
Kent D. Boklan, Alexander W. Dent, Christopher A. ...
ICLP
2007
Springer
15 years 5 months ago
Core TuLiP Logic Programming for Trust Management
We propose CoreTuLiP - the core of a trust management language based on Logic Programming. CoreTuLiP is based on a subset of moded logic programming, but enjoys the features of TM ...
Marcin Czenko, Sandro Etalle
ICAC
2005
IEEE
15 years 4 months ago
Self-Adjusting Trust and Selection for Web Services
Service-oriented architectures enable services to be dynamically selected and integrated at runtime, thus enabling system flexibility and adaptiveness—autonomic attributes that...
E. Michael Maximilien, Munindar P. Singh