Sciweavers

8243 search results - page 64 / 1649
» Can We Manage Trust
Sort
View
WECWIS
2005
IEEE
87views ECommerce» more  WECWIS 2005»
14 years 1 months ago
TrustDavis: A Non-Exploitable Online Reputation System
We present TrustDavis, an online reputation system that provides insurance against trade fraud by leveraging existing relationships between players, such as the ones present in so...
Dimitri do B. DeFigueiredo, Earl T. Barr
SSS
2009
Springer
14 years 6 days ago
Optimistic Fair Exchange Using Trusted Devices
Efficiency of optimistic fair exchange using trusted devices is studied. Pfitzmann, Schunter and Waidner (PODC 1998) have shown that four messages in the main sub-protocol is op...
Mohammad Torabi Dashti
FC
2005
Springer
143views Cryptology» more  FC 2005»
14 years 1 months ago
Risk Assurance for Hedge Funds Using Zero Knowledge Proofs
Abstract. This work introduces a new tool for a fund manager to verifiably communicate portfolio risk characteristics to an investor. We address the classic dilemma: How can an in...
Michael Szydlo
GSEM
2007
Springer
14 years 1 months ago
A Policy Language for Integrating Heterogeneous Authorization Policies
In order to manage and enforce multiple heterogeneous authorization policies in distributed authorization environment, we defined the root policy specification language and its cor...
Wei Zhou, Christoph Meinel
EUROPKI
2005
Springer
14 years 1 months ago
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server
This paper describes the development of a flexible Role Based Access Control (RBAC) authorisation module – the Shibboleth and Apache Authorisation Module (SAAM) which is based on...
Wensheng Xu, David W. Chadwick, Sassa Otenko