Sciweavers

947 search results - page 115 / 190
» HMM-Based Trust Model
Sort
View
SAJ
2002
97views more  SAJ 2002»
15 years 9 days ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
ICDE
2009
IEEE
690views Database» more  ICDE 2009»
15 years 7 months ago
A Model for Data Leakage Detection
— We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
130
Voted
ESAW
2007
Springer
15 years 6 months ago
Arguing about Reputation: The LRep Language
In the field of multiagent systems (MAS), the computational models of trust and reputation have attracted increasing interest since electronic and open environments became a reali...
Isaac Pinyol, Jordi Sabater-Mir
87
Voted
MSWIM
2005
ACM
15 years 6 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
EUROPKI
2007
Springer
15 years 4 months ago
Time Capsule Signature: Efficient and Provably Secure Constructions
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...