Sciweavers

1715 search results - page 268 / 343
» Trust and Reputation Systems
Sort
View
128
Voted
ATAL
2005
Springer
15 years 10 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...
174
Voted
IUI
2003
ACM
15 years 10 months ago
A zero-input interface for leveraging group experience in web browsing
The experience of a trusted group of colleagues can help users improve the quality and focus of their browsing and searching activities. How could a system provide such help, when...
Taly Sharon, Henry Lieberman, Ted Selker
EUROSYS
2010
ACM
15 years 10 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
CANDC
1999
ACM
15 years 9 months ago
A framework that supports collective creativity in design using visual images
The goal of our research is to develop computer systems that support designers’ collective creativity; such systems support individual creative aspects in design through the use...
Kumiyo Nakakoji, Yasuhiro Yamamoto, Masao Ohira
ESORICS
2008
Springer
15 years 7 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...