Sciweavers

325 search results - page 12 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
SAC
2009
ACM
14 years 2 months ago
Defending online reputation systems against collaborative unfair raters through signal modeling and trust
Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. T...
Yafei Yang, Yan Lindsay Sun, Steven Kay, Qing Yang
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
14 years 4 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
IWIA
2005
IEEE
14 years 1 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham
JSAC
2006
99views more  JSAC 2006»
13 years 7 months ago
Incentives for large peer-to-peer systems
We consider problems of provisioning an excludable public good amongst n potential members of a peer-to-peer system who are able to communicate information about their private pre...
Costas Courcoubetis, Richard R. Weber
COMPCON
1995
IEEE
13 years 11 months ago
NetBill: An Internet Commerce System Optimized for Network Delivered Services
Netbill is a business model, set of protocols, and software implementation for commerce in information goods and other network delivered services. It has very low transaction cost...
Marvin A. Sirbu, J. D. Tygar