Sciweavers

785 search results - page 79 / 157
» A Calculus for Trust Management
Sort
View
CSREASAM
2003
13 years 10 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
MMMACNS
2010
Springer
13 years 7 months ago
Credentials Management for High-Value Transactions
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...
DEXAW
2005
IEEE
117views Database» more  DEXAW 2005»
14 years 2 months ago
DMW - A Middleware for Digital Rights Management in Peer-to-Peer Networks
Enforcing DRM in collaborative, Peer-to-Peer (P2P) networks comprising different types of user devices is a challenging task as it is difficult to monitor the network operations i...
Praveen Kumar, G. Sridhar, V. Sridhar, R. Gadh
HPCNCS
2007
13 years 10 months ago
A Formal Approach for Identity Management in Federated Web Services
The objective of the proposed work is to formally specify and implement a federated web service model in which the identity management problem and security features are analyzed. ...
S. Chandrasekaran, C. Dinesh, Kartic Ramesh, Al. M...
EUSFLAT
2003
13 years 10 months ago
Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems
Emerging approaches to enforce some form of protection in (pseudo)anonymous peer to peer systems propose the use of reputations as a means to establish the reliability of servents...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...