Sciweavers

1715 search results - page 272 / 343
» Trust and Reputation Systems
Sort
View
166
Voted
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
14 years 8 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
169
Voted
ESORICS
2011
Springer
14 years 4 months ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...
WSDM
2012
ACM
246views Data Mining» more  WSDM 2012»
14 years 18 days ago
Auralist: introducing serendipity into music recommendation
Recommendation systems exist to help users discover content in a large body of items. An ideal recommendation system should mimic the actions of a trusted friend or expert, produc...
Yuan Cao Zhang, Diarmuid Ó Séaghdha,...
165
Voted
ICTAI
2009
IEEE
15 years 11 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
15 years 11 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky