Sciweavers

947 search results - page 84 / 190
» HMM-Based Trust Model
Sort
View
SACMAT
2003
ACM
15 years 6 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
93
Voted
WWW
2005
ACM
16 years 1 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
87
Voted
ATAL
2004
Springer
15 years 6 months ago
Trust-Based Mechanism Design
We define trust-based mechanism design as an augmentation of traditional mechanism design in which agents take into account the degree of trust that they have in their counterpar...
Rajdeep K. Dash, Sarvapali D. Ramchurn, Nicholas R...
96
Voted
ITRUST
2004
Springer
15 years 6 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
90
Voted
OSDI
2000
ACM
15 years 2 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro