Sciweavers

754 search results - page 80 / 151
» Can self-managed systems be trusted
Sort
View
GSEM
2007
Springer
14 years 4 months ago
A Policy Language for Integrating Heterogeneous Authorization Policies
In order to manage and enforce multiple heterogeneous authorization policies in distributed authorization environment, we defined the root policy specification language and its cor...
Wei Zhou, Christoph Meinel
INFOCOM
2003
IEEE
14 years 3 months ago
Cooperative Peer Groups in NICE
Abstract— We present a distributed scheme for trust inference in peer-to-peer networks. Our work is in context of the NICE system, which is a platform for implementing cooperativ...
Seungjoon Lee, Rob Sherwood, Samrat Bhattacharjee
INTERACT
2003
13 years 11 months ago
Confidence Displays and Training in Recommender Systems
: Recommender systems help users sort through vast quantities of information. Sometimes, however, users do not know if they can trust the recommendations they receive. Adding a con...
Sean M. McNee, Shyong K. Lam, Catherine Guetzlaff,...
CCS
2009
ACM
14 years 5 months ago
Towards secure dataflow processing in open distributed systems
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 4 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen