Sciweavers

754 search results - page 118 / 151
» Can self-managed systems be trusted
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Changing neighbours: improving tag-based cooperation
In systems of autonomous self-interested agents, in which agents' neighbourhoods are defined by their connections to others, cooperation can arise through observation of the ...
Nathan Griffiths, Michael Luck
IJNSEC
2007
111views more  IJNSEC 2007»
13 years 9 months ago
A Novel Peer-to-peer Payment Protocol
In this paper a novel electronic payment protocol suitable for “peer-to-peer” (P2P) networks is presented. It implements electronic cash-based transactions, between buyers and...
Despoina Palaka, Petros Daras, Kosmas Petridis, Mi...
CSE
2009
IEEE
14 years 3 months ago
Davis Social Links or: How I Learned to Stop Worrying and Love the Net
—When the Internet was conceived, its fundamental operation was envisioned to be point-to-point communication allowing anybody to talk directly to anybody. With its increasing su...
Matt Spear, Xiaoming Lu, Shyhtsun Felix Wu
EUROSYS
2008
ACM
14 years 6 months ago
Flicker: an execution infrastructure for tcb minimization
We present Flicker, an infrastructure for executing securitysensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide me...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
SOUPS
2005
ACM
14 years 2 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar