Sciweavers

1363 search results - page 125 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
ESORICS
2006
Springer
15 years 3 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
CSCW
2008
ACM
15 years 1 months ago
Pushing relevant artifact annotations in collaborative software development
Recent techniques show the benefits of attaching communitygenerated knowledge to artifacts in an information space and presenting it to subsequent readers. We argue that such know...
Uri Dekel, James D. Herbsleb
FC
2008
Springer
82views Cryptology» more  FC 2008»
15 years 1 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
WICSA
2004
15 years 21 days ago
PACE: An Architectural Style for Trust Management in Decentralized Applications
Distributed applications that lack a central, trustworthy authority for control and validation are properly termed decentralized. Multiple, independent agencies, or "partners...
Girish Suryanarayana, Justin R. Erenkrantz, Scott ...
69
Voted
DA
2007
69views more  DA 2007»
14 years 11 months ago
e-Participation and Decision Analysis
Decision analytic methods are now used frequently to help articulate and structure debate and deliberations among citizens and stakeholders in societal decisions. Methods vary, bu...
Simon French, David Ríos Insua, Fabrizio Ru...