Sciweavers

555 search results - page 22 / 111
» Anonymous Webs of Trust
Sort
View
PERCOM
2009
ACM
15 years 4 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
72
Voted
NDSS
2002
IEEE
15 years 2 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
SP
1997
IEEE
163views Security Privacy» more  SP 1997»
15 years 1 months ago
Anonymous Connections and Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
Paul F. Syverson, David M. Goldschlag, Michael G. ...
72
Voted
BDIM
2008
IEEE
119views Business» more  BDIM 2008»
14 years 11 months ago
On integrating trust into business-driven management of web services and their compositions
This paper discusses why trust is an essential aspect for business-driven IT management, as well as how it impacts management of web services and their compositions. We summarize t...
Chern Har Yew, Vladimir Tosic, Hanan Lutfiyya
EKAW
2010
Springer
14 years 8 months ago
Representing, Proving and Sharing Trustworthiness of Web Resources Using Veracity
The World Wide Web has evolved into a distributed network of web applications facilitating the publication of information on a large scale. Judging whether such information can be ...
Grégoire Burel, Amparo Elizabeth Cano, Matt...