Sciweavers

2022 search results - page 275 / 405
» Trust in Multi-Agent Systems
Sort
View
88
Voted
USS
2008
15 years 2 months ago
Towards Application Security on Untrusted Operating Systems
Complexity in commodity operating systems makes compromises inevitable. Consequently, a great deal of work has examined how to protect security-critical portions of applications f...
Dan R. K. Ports, Tal Garfinkel
101
Voted
INTERACT
2003
15 years 1 months ago
Confidence Displays and Training in Recommender Systems
: Recommender systems help users sort through vast quantities of information. Sometimes, however, users do not know if they can trust the recommendations they receive. Adding a con...
Sean M. McNee, Shyong K. Lam, Catherine Guetzlaff,...
100
Voted
AAAI
1996
15 years 1 months ago
The NASA Personnel Security Processing Expert System
The NASA Personnel Security Processing Expert System is a tool that automatically determines the appropriate personnel background investigation required for a civil servant or con...
David Silberberg, Robert Thomas
CCS
2009
ACM
15 years 7 months ago
Towards secure dataflow processing in open distributed systems
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
98
Voted
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 6 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen