Sciweavers

730 search results - page 115 / 146
» Modeling trust in collaborative information systems
Sort
View
120
Voted
SOCO
2005
Springer
15 years 9 months ago
Improving Composition Support with Lightweight Metadata-Based Extensions of Component Models
Software systems that rely on the component paradigm build new components by assembling existing prefabricated components. Most currently available IDEs support graphical component...
Johann Oberleitner, Michael Fischer
126
Voted
CSE
2009
IEEE
15 years 10 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
130
Voted
IFIP
2005
Springer
15 years 9 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
149
Voted
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 7 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
102
Voted
DIGITALCITIES
2000
Springer
15 years 8 months ago
Extending the Services and the Accessibility of Community Networks
Community networks are community-oriented information and communication systems that are generally patterned after the public library’s model of free, inclusive service and commi...
Antonietta Grasso, Dave Snowdon, Michael Koch