Sciweavers

785 search results - page 118 / 157
» A Calculus for Trust Management
Sort
View
IH
1998
Springer
13 years 11 months ago
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control th...
Markus G. Kuhn, Ross J. Anderson
SIGDOC
1992
ACM
13 years 11 months ago
Documenting software systems with views
Softwareprofessionals rely on internaldocumentationas an aid in understanding programs. Unfortunately, the documentation for most programs is usually out-of-date and cannot be tru...
Scott R. Tilley, Hausi A. Müller, Mehmet A. O...
FOIKS
2004
Springer
13 years 11 months ago
Simplification of Integrity Constraints for Data Integration
When two or more databases are combined into a global one, integrity may be violated even when each database is consistent with its own local integrity constraints. Efficient metho...
Henning Christiansen, Davide Martinenghi
HERCMA
2001
141views Mathematics» more  HERCMA 2001»
13 years 9 months ago
Towards an ISO-9000 compliant certification service provider
In this paper we present a complete reference framework for the operation of Certification Service Provider as an organisation. The objective is to form an intermediate reference m...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
ECIS
2003
13 years 9 months ago
An analysis of the impact of reputation on supply webs
In long-term, recurring contractual relationships, which are common in the B2B-area, reputation and trust play an outstanding role. The impact of reputation and price-based assess...
Jochen Franke, Tim Stockheim