Sciweavers

706 search results - page 61 / 142
» Trust management for IPsec
Sort
View
JCP
2006
135views more  JCP 2006»
14 years 12 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
ITRUST
2005
Springer
15 years 5 months ago
A Representation Model of Trust Relationships with Delegation Extensions
Abstract. Logic languages establish a formal framework to solve authorization and delegation conflicts. However, we consider that a visual representation is necessary since graphs...
Isaac Agudo, Javier Lopez, José A. Monteneg...
ITRUST
2005
Springer
15 years 5 months ago
Security and Trust in the Italian Legal Digital Signature Framework
Abstract. The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities. In this paper we describe each of...
Stefano Zanero
DISCEX
2003
IEEE
15 years 5 months ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
CAISE
2006
Springer
15 years 3 months ago
Enhancing trust and buy-in from business: a platform for business -driven development of B2B transactions
A measure for the quality of software is the extent to which it corresponds to the business objectives and requirements it was designed for. The earlier those who elicit the requir...
Michael Schmitt, Bertrand Grégoire, Stefan ...