Sciweavers

325 search results - page 12 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
SAC
2009
ACM
15 years 7 months ago
Defending online reputation systems against collaborative unfair raters through signal modeling and trust
Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. T...
Yafei Yang, Yan Lindsay Sun, Steven Kay, Qing Yang
121
Voted
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
15 years 9 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
IWIA
2005
IEEE
15 years 6 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham
100
Voted
JSAC
2006
99views more  JSAC 2006»
15 years 16 days ago
Incentives for large peer-to-peer systems
We consider problems of provisioning an excludable public good amongst n potential members of a peer-to-peer system who are able to communicate information about their private pre...
Costas Courcoubetis, Richard R. Weber
103
Voted
COMPCON
1995
IEEE
15 years 4 months ago
NetBill: An Internet Commerce System Optimized for Network Delivered Services
Netbill is a business model, set of protocols, and software implementation for commerce in information goods and other network delivered services. It has very low transaction cost...
Marvin A. Sirbu, J. D. Tygar