Sciweavers

2022 search results - page 218 / 405
» Trust in Multi-Agent Systems
Sort
View
104
Voted
CCS
2005
ACM
15 years 6 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
89
Voted
SAC
2008
ACM
15 years 4 days ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
90
Voted
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
15 years 6 months ago
Trusted Software's Holy Grail
In this paper, we discuss what we believe is the grand challenge facing the software quality research community: the ability to accurately define, in the very earliest stages of d...
Jeffrey M. Voas
118
Voted
FLAIRS
2000
15 years 2 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
94
Voted
SIAMJO
2008
93views more  SIAMJO 2008»
15 years 18 days ago
Recursive Trust-Region Methods for Multiscale Nonlinear Optimization
A class of trust-region methods is presented for solving unconstrained nonlinear and possibly nonconvex discretized optimization problems, like those arising in systems governed by...
Serge Gratton, Annick Sartenaer, Philippe L. Toint