Sciweavers

2422 search results - page 433 / 485
» Security Policy Consistency
Sort
View
ISEC
2001
Springer
126views ECommerce» more  ISEC 2001»
15 years 2 months ago
Building Trust for E-Commerce: Collaborating Label Bureaus
A major problem facing the full deployment of business-to-consumer (B2C) e-commerce is the development of trust on the side of the consumer. People develop trust in a business thr...
Michael A. Shepherd, Anil Dhonde, Carolyn R. Watte...
FC
2010
Springer
181views Cryptology» more  FC 2010»
15 years 1 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
ESWS
2006
Springer
15 years 1 months ago
WSTO: A Classification-Based Ontology for Managing Trust in Semantic Web Services
The aim of this paper is to provide a general ontology that allows the specification of trust requirements in the Semantic Web Services environment. Both client and Web Service can...
Stefania Galizia
TIC
2000
Springer
137views System Software» more  TIC 2000»
15 years 1 months ago
Scalable Certification for Typed Assembly Language
Abstract. A type-based certifying compiler maps source code to machine code and target-level type annotations. The target-level annotations make it possible to prove easily that th...
Dan Grossman, J. Gregory Morrisett
DGO
2007
174views Education» more  DGO 2007»
14 years 11 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá