Sciweavers

8243 search results - page 100 / 1649
» Can We Manage Trust
Sort
View
TOIT
2008
92views more  TOIT 2008»
13 years 9 months ago
Security and identification indicators for browsers against spoofing and phishing attacks
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages...
Amir Herzberg, Ahmad Jbara
RAID
2001
Springer
14 years 1 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 7 months ago
Liquidity in Credit Networks: A Little Trust Goes a Long Way
Credit networks represent a way of modeling trust between entities in a network. Nodes in the network print their own currency and trust each other for a certain amount of each ot...
Pranav Dandekar, Ashish Goel, Ramesh Govindan, Ian...
IEEEIAS
2008
IEEE
14 years 3 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell
WWW
2011
ACM
13 years 4 months ago
Trust analysis with clustering
Web provides rich information about a variety of objects. Trustability is a major concern on the web. Truth establishment is an important task so as to provide the right informati...
Manish Gupta, Yizhou Sun, Jiawei Han