Sciweavers

376 search results - page 13 / 76
» Integrity constraints in trust management
Sort
View
CASES
2008
ACM
15 years 3 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
15 years 8 months ago
Contract as a Source of Trust--Commitment in Successful IT Outsourcing Relationship: An Empirical Study
Existing studies on IT outsourcing have mainly examined partnership factors that influence IT outsourcing effectiveness. This stream of IT outsourcing research has largely ignored...
Jahyun Goo, Kichan Nam
CN
2004
108views more  CN 2004»
15 years 1 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
ICIW
2009
IEEE
14 years 11 months ago
Constraint Integration and Violation Handling for BPEL Processes
Autonomic, i.e. dynamic and fault-tolerant Web service composition is a requirement resulting from recent developments such as on-demand services. In the context of planning-based...
MingXue Wang, Kosala Yapa Bandara, Claus Pahl
ISCAPDCS
2004
15 years 3 months ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...