Sciweavers

8243 search results - page 45 / 1649
» Can We Manage Trust
Sort
View
SPC
2005
Springer
14 years 1 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
JUCS
2006
133views more  JUCS 2006»
13 years 7 months ago
The Transformation of the Web: How Emerging Communities Shape the Information we Consume
: To date, one of the main aims of the World Wide Web has been to provide users with information. In addition to private homepages, large professional information providers, includ...
Josef Kolbitsch, Hermann A. Maurer
OTM
2007
Springer
14 years 1 months ago
Fine Grained Access Control with Trust and Reputation Management for Globus
Abstract. We propose an integrated architecture, extending a framework for fine grained access control of Grid computational services, with an inference engine managing reputation...
Maurizio Colombo, Fabio Martinelli, Paolo Mori, Ma...
AINA
2007
IEEE
14 years 2 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
ICCCN
2008
IEEE
14 years 2 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda