Sciweavers

8243 search results - page 138 / 1649
» Can We Manage Trust
Sort
View
IJISEC
2007
119views more  IJISEC 2007»
13 years 10 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
LORI
2009
Springer
14 years 4 months ago
Dynamic Testimonial Logic
We propose a dynamic testimonial logic (DTL) to model communication and belief change among agents with different dispositions to trust each other as information sources. DTL is ...
Wesley H. Holliday
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
14 years 3 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
WETICE
1998
IEEE
14 years 2 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
WWCA
1998
Springer
14 years 2 months ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai