Sciweavers

754 search results - page 55 / 151
» Can self-managed systems be trusted
Sort
View
ICICS
2005
Springer
15 years 9 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
173
Voted
MOBISYS
2010
ACM
15 years 6 months ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...
110
Voted
WETICE
2006
IEEE
15 years 10 months ago
A Trust-enabled P2P Recommender System
In this paper we present a trust-oriented method that can be used when building P2P recommender systems. We discuss its benefits in comparison to centralized solutions, its requir...
Georgios Pitsilis, Lindsay Marshall
113
Voted
EUC
2007
Springer
15 years 10 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
HOLOMAS
2007
Springer
15 years 10 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...