Sciweavers

754 search results - page 114 / 151
» Can self-managed systems be trusted
Sort
View
EDCC
2005
Springer
14 years 2 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...
IFIP
2005
Springer
14 years 2 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
IPPS
2003
IEEE
14 years 2 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
BPM
2008
Springer
188views Business» more  BPM 2008»
13 years 11 months ago
Social Software for Modeling Business Processes
Abstract. The aim of this paper is to show how the use of social networks may help users to behave as modelers they trust. Users are guided in this respect within the context of an...
Agnes Koschmider, Minseok Song, Hajo A. Reijers
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
14 years 1 months ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...