Sciweavers

830 search results - page 94 / 166
» Owned Policies for Information Security
Sort
View
COMPSAC
2006
IEEE
15 years 6 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
AGENTS
1999
Springer
15 years 4 months ago
Agent Aided Aircraft Maintenance
Aircraft maintenance is performed by mechanics who are required, by regulation, to consult expert engineers for repair instructions and approval. In addition to their own experien...
Onn Shehory, Katia P. Sycara, Gita Sukthankar, Vic...
SDMW
2005
Springer
15 years 5 months ago
An Authorization Framework for Sharing Data in Web Service Federations
In this paper we present our authorization framework that supports the dynamic set-up of Web service federations for sharing data within virtual federations. Building on previous w...
Martin Wimmer, Alfons Kemper
EUROSEC
2010
ACM
15 years 6 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
WPES
2005
ACM
15 years 5 months ago
Secure off-the-record messaging
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented “Off the Record Messaging” (OTR), a protocol designed to add endto-e...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk