Sciweavers

754 search results - page 53 / 151
» Can self-managed systems be trusted
Sort
View
SIGADA
2005
Springer
14 years 3 months ago
The affordable application of formal methods to software engineering
The purpose of this research paper is to examine (1) why formal methods are required for software systems today; (2) the Praxis High Integrity Systems’ Correctness-by-Constructi...
James F. Davis
WWW
2008
ACM
14 years 11 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
CSCW
2012
ACM
12 years 5 months ago
Community-based web security: complementary roles of the serious and casual contributors
Does crowdsourcing work for web security? While the herculean task of evaluating hundreds of millions of websites can certainly benefit from the wisdom of crowds, skeptics questi...
Pern Hui Chia, John Chuang
CCS
2001
ACM
14 years 2 months ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...
MOBISYS
2007
ACM
14 years 9 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi