Sciweavers

422 search results - page 35 / 85
» Walking the Web of Trust
Sort
View
SWS
2004
ACM
15 years 5 months ago
Security in WebCom: addressing naming issues for a web services architecture
Supporting security in distributed systems is becoming more important with the ongoing work in grids, distributed middlewares and web services. Decentralised security architecture...
Thomas B. Quillinan, Simon N. Foley
AIRWEB
2005
Springer
15 years 5 months ago
Pagerank Increase under Different Collusion Topologies
We study the impact of collusion –nepotistic linking– in a Web graph in terms of Pagerank. We prove a bound on the Pagerank increase that depends both on the reset probability...
Ricardo A. Baeza-Yates, Carlos Castillo, Vicente L...
JCT
2007
108views more  JCT 2007»
14 years 11 months ago
The cover time of the preferential attachment graph
The preferential attachment graph Gm(n) is a random graph formed by adding a new vertex at each time step, with m edges which point to vertices selected at random with probability...
Colin Cooper, Alan M. Frieze
WWW
2001
ACM
16 years 15 days ago
XML Key Management Specification (XKMS)
The XML Key Management Specification (XKMS) is described. XKMS is a Web Service that provides an interface between an XML application and a Public Key Infrastructure (PKI). XKMS g...
Phillip M. Hallam-Baker, Warwick Ford
WWW
2005
ACM
16 years 15 days ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...