Sciweavers

1715 search results - page 159 / 343
» Trust and Reputation Systems
Sort
View
TDSC
2011
14 years 5 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
CSFW
2008
IEEE
15 years 4 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
EDOC
2006
IEEE
15 years 4 months ago
Trust Assessment Using Provenance in Service Oriented Applications
Workflow forms a key part of many existing Service Oriented applications, involving the integration of services that may be made available at distributed sites. It is possible ng...
Shrija Rajbhandari, Arnaud Contes, Omer F. Rana, V...
CSCW
1998
ACM
15 years 2 months ago
Cooperative Knowledge Work and Practices of Trust: Sharing Environmental Planning Data Sets
Knowledge communities of all kinds have social and material practices for deciding what is known and who is to be trusted. In this paper, we address a specific kind of knowledge w...
Nancy A. Van House, Mark H. Butler, Lisa R. Schiff
DBSEC
2007
104views Database» more  DBSEC 2007»
14 years 11 months ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng