Sciweavers

1813 search results - page 32 / 363
» Mechanism Design on Trust Networks
Sort
View
ICDCSW
2007
IEEE
15 years 6 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
SIGOPSE
2004
ACM
15 years 5 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
CHI
2008
ACM
16 years 5 days ago
Results from deploying a participation incentive mechanism within the enterprise
Success and sustainability of social networking sites is highly dependent on user participation. To encourage contribution to an opt-in social networking site designed for employe...
Rosta Farzan, Joan Morris DiMicco, David R. Millen...
CN
2002
87views more  CN 2002»
14 years 11 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
IJNSEC
2011
272views more  IJNSEC 2011»
14 years 6 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...