Sciweavers

165 search results - page 24 / 33
» Shinren: Non-monotonic Trust Management for Distributed Syst...
Sort
View
MIDDLEWARE
2007
Springer
15 years 5 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
IDTRUST
2009
ACM
15 years 6 months ago
Palantir: a framework for collaborative incident response and investigation
Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we ar...
Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Mic...
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 3 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
SACMAT
2010
ACM
15 years 4 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
KCAP
2005
ACM
15 years 5 months ago
User-centered consultation by a society of agents
User-centered consultation systems can be viewed as systems with trust in the competence of the user, whereas conventional knowledge systems are often based on some mistrust. By o...
Georg Buscher, Joachim Baumeister, Frank Puppe, Di...