Sciweavers

947 search results - page 105 / 190
» HMM-Based Trust Model
Sort
View
CAISE
2006
Springer
15 years 4 months ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
111
Voted
IEEEARES
2007
IEEE
15 years 7 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma
100
Voted
GCC
2004
Springer
15 years 6 months ago
A Novel VO-Based Access Control Model for Grid
As an important aspect of grid security, access control model gets more and more attention. Entities in virtual organizations (VOs) must establish a dynamic, secure and cooperative...
Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou
120
Voted
SIGMOD
2002
ACM
147views Database» more  SIGMOD 2002»
16 years 24 days ago
Conceptual Model of Web Service Reputation
Current Web services standards enable publishing service descriptions and finding services on a match based on criteria such as method signatures or service category. However, cur...
E. Michael Maximilien, Munindar P. Singh
80
Voted
ICDE
2006
IEEE
125views Database» more  ICDE 2006»
15 years 6 months ago
Towards a Quality Model for Effective Data Selection in Collaboratories
Data-driven scientific applications utilize workflow frameworks to execute complex dataflows, resulting in derived data products of unknown quality. We discuss our on-going resear...
Yogesh Simmhan, Beth Plale, Dennis Gannon