Sciweavers

989 search results - page 92 / 198
» An information-based model for trust
Sort
View
ENTCS
2010
130views more  ENTCS 2010»
14 years 11 months ago
Compositional System Security with Interface-Confined Adversaries
This paper presents a formal framework for compositional reasoning about secure systems. A key insight is to view a trusted system in terms of the interfaces that the various comp...
Deepak Garg, Jason Franklin, Dilsun Kirli Kaynar, ...
EKAW
2010
Springer
14 years 9 months ago
Representing, Proving and Sharing Trustworthiness of Web Resources Using Veracity
The World Wide Web has evolved into a distributed network of web applications facilitating the publication of information on a large scale. Judging whether such information can be ...
Grégoire Burel, Amparo Elizabeth Cano, Matt...
ATAL
2009
Springer
15 years 5 months ago
Pragmatic-strategic reputation-based decisions in BDI agents
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the...
Isaac Pinyol, Jordi Sabater-Mir
CRYPTO
2007
Springer
110views Cryptology» more  CRYPTO 2007»
15 years 5 months ago
Cryptography in the Multi-string Model
The common random string model introduced by Blum, Feldman and Micali permits the construction of cryptographic protocols that are provably impossible to realize in the standard m...
Jens Groth, Rafail Ostrovsky
92
Voted
COMPSAC
2003
IEEE
15 years 4 months ago
Facilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network cha...
Feng Zhu, Matt W. Mutka, Lionel M. Ni