Sciweavers

2022 search results - page 344 / 405
» Trust in Multi-Agent Systems
Sort
View
166
Voted
POPL
2001
ACM
16 years 21 days ago
Type-preserving garbage collectors
By combining existing type systems with standard typebased compilation techniques, we describe how to write strongly typed programs that include a function that acts as a tracing ...
Daniel C. Wang, Andrew W. Appel
89
Voted
WWW
2010
ACM
15 years 7 months ago
Highlighting disputed claims on the web
We describe Dispute Finder, a browser extension that alerts a user when information they read online is disputed by a source that they might trust. Dispute Finder examines the tex...
Rob Ennals, Beth Trushkowsky, John Mark Agosta
CCS
2010
ACM
15 years 7 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
97
Voted
APNOMS
2009
Springer
15 years 7 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong
83
Voted
FSTTCS
2009
Springer
15 years 7 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...