Sciweavers

3395 search results - page 2 / 679
» Designs, Disputes and Strategies
Sort
View
DGO
2006
96views Education» more  DGO 2006»
13 years 8 months ago
A process-driven tool to support online dispute resolution
This demonstration shows a prototype tool that projects an impression of how execution of a formally defined process will facilitate dispute resolution. Tool flexibility supports ...
Lori A. Clarke, Alan Gaitenby, Daniel Gyllstrom, E...
ICNP
1999
IEEE
13 years 11 months ago
Policy Disputes in Path-Vector Protocols
The Border Gateway Protocol, BGP, is currently the only interdomain routing protocol employed on the Internet. As required of any interdomain protocol, BGP allows policy-based met...
Timothy Griffin, F. Bruce Shepherd, Gordon T. Wilf...
MANSCI
2006
94views more  MANSCI 2006»
13 years 6 months ago
Design of Robust Business-to-Business Electronic Marketplaces with Guaranteed Privacy
Most successful online marketplaces today are owned and operated by firms that are themselves traders in the marketplace. This raises significant concerns about the fairness of th...
Joakim Kalvenes, Amit Basu
JCST
2007
98views more  JCST 2007»
13 years 6 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
ISJGP
2007
89views more  ISJGP 2007»
13 years 6 months ago
Trends in Security Product Evaluations
Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product ...
Richard E. Smith