Sciweavers

1715 search results - page 189 / 343
» Trust and Reputation Systems
Sort
View
ECOOP
2005
Springer
15 years 3 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
IACR
2011
89views more  IACR 2011»
13 years 9 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
132
Voted
SIGMOD
2008
ACM
143views Database» more  SIGMOD 2008»
15 years 10 months ago
A case study in database reliability: component types, usage profiles, and testing
Data management lies at the core of most modern information technology deployments. Accordingly, the reliability of the database management system (DBMS) is critical to the reputa...
C. A. Taylor, Mechelle Gittens, Andriy V. Miransky...
CHI
2010
ACM
15 years 5 months ago
Lessons learned from blog muse: audience-based inspiration for bloggers
Blogging in the enterprise is increasingly popular and recent research has shown that there are numerous benefits for both individuals and the organization, e.g. developing reputa...
Casey Dugan, Werner Geyer, David R. Millen
KBSE
2008
IEEE
15 years 4 months ago
Self-healing strategies for component integration faults
Software systems increasingly integrate Off-The-Shelf (OTS) components. However, due to the lack of knowledge about the reused OTS components, this integration is fragile and can ...
Hervé Chang, Leonardo Mariani, Mauro Pezz&e...