Sciweavers

947 search results - page 107 / 190
» HMM-Based Trust Model
Sort
View
101
Voted
IJSN
2006
116views more  IJSN 2006»
15 years 19 days ago
Secure collaborations over message boards
: We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed arc...
Mahalingam Ramkumar, Nasir D. Memon
104
Voted
KBSE
2005
IEEE
15 years 6 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
15 years 16 days ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
GLOBE
2009
Springer
15 years 5 months ago
Protecting Data Privacy in Structured P2P Networks
P2P systems are increasingly used for efficient, scalable data sharing. Popular applications focus on massive file sharing. However, advanced applications such as online communiti...
Mohamed Jawad, Patricia Serrano-Alvarado, Patrick ...
152
Voted
POST
2012
218views more  POST 2012»
13 years 8 months ago
A Core Calculus for Provenance
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer sys...
Umut A. Acar, Amal Ahmed, James Cheney, Roly Perer...