Sciweavers

382 search results - page 48 / 77
» A Formalization of Trust Alignment
Sort
View
WINE
2005
Springer
149views Economy» more  WINE 2005»
14 years 1 months ago
Enforcing Truthful Strategies in Incentive Compatible Reputation Mechanisms
Abstract. We commonly use the experience of others when taking decisions. Reputation mechanisms aggregate in a formal way the feedback collected from peers and compute the reputati...
Radu Jurca, Boi Faltings
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
13 years 12 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
AAAI
2007
13 years 10 months ago
Reasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
Thomas Wölfl
ENTCS
2008
91views more  ENTCS 2008»
13 years 7 months ago
Implementing Real Numbers With RZ
RZ is a tool which translates axiomatizations of mathematical structures to program specifications using the realizability interpretation of logic. This helps programmers correctl...
Andrej Bauer, Iztok Kavkler
IJISEC
2010
87views more  IJISEC 2010»
13 years 6 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu