Sciweavers

1715 search results - page 199 / 343
» Trust and Reputation Systems
Sort
View
DBSEC
2009
124views Database» more  DBSEC 2009»
14 years 11 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
ICONS
2008
IEEE
15 years 4 months ago
Using User Preferences to Enhance Privacy in Pervasive Systems
With the increasing interest in developing pervasive computing technologies there is growing recognition of the problems of maintaining user privacy. In the Daidalos pervasive sys...
Elizabeth Papadopoulou, Sarah McBurney, Nick K. Ta...
SIGDOC
1992
ACM
15 years 2 months ago
Documenting software systems with views
Softwareprofessionals rely on internaldocumentationas an aid in understanding programs. Unfortunately, the documentation for most programs is usually out-of-date and cannot be tru...
Scott R. Tilley, Hausi A. Müller, Mehmet A. O...
DIMVA
2010
14 years 11 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
WWW
2006
ACM
15 years 10 months ago
The credibility of the posted information in a recommendation system based on a map
We propose a method for estimating the credibility of the posted information from users. The system displays these information on the map. Since posted information can include sub...
Koji Yamamoto, Daisuke Katagami, Katsumi Nitta, Ak...