Sciweavers

1715 search results - page 197 / 343
» Trust and Reputation Systems
Sort
View
POLICY
2005
Springer
15 years 3 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
CCS
2009
ACM
15 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
WISEC
2010
ACM
14 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
LPNMR
2011
Springer
14 years 27 days ago
Approximations for Explanations of Inconsistency in Partially Known Multi-Context Systems
Abstract. Multi-context systems are a formalism to interlink decentralized and heterogeneous knowledge based systems (contexts), which interact via (possibly nonmonotonic) bridge r...
Thomas Eiter, Michael Fink, Peter Schüller
ACSAC
2006
IEEE
15 years 4 months ago
An Internet Voting System Supporting User Privacy
This work introduces the A system1 , an Internetbased, free and open source electronic voting system which employs strong cryptography. Our system is a fully functiona...
Aggelos Kiayias, Michael Korman, David Walluck