Sciweavers

706 search results - page 59 / 142
» Trust management for IPsec
Sort
View
ITRUST
2005
Springer
15 years 5 months ago
A Probabilistic Trust Model for Handling Inaccurate Reputation Sources
Abstract. This research aims to develop a model of trust and reputation that will ensure good interactions amongst software agents in large scale open systems in particular. The fo...
Jigar Patel, W. T. Luke Teacy, Nicholas R. Jenning...
CN
2004
108views more  CN 2004»
14 years 11 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
CSE
2009
IEEE
15 years 6 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
15 years 4 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
PDCAT
2005
Springer
15 years 5 months ago
Design of a Security Management Middleware in Ubiquitous Computing Environments
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...