Sciweavers

2057 search results - page 222 / 412
» Distributed Secure Systems: Then and Now
Sort
View
WWW
2004
ACM
16 years 5 months ago
Spam attacks: p2p to the rescue
We propose a decentralized privacy-preserving approach to spam filtering. Our solution exploits robust digests to identify messages that are a slight variation of one another and ...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
ESORICS
2009
Springer
16 years 5 months ago
The Wisdom of Crowds: Attacks and Optimal Constructions
We present a traffic analysis of the ADU anonymity scheme presented at ESORICS 2008, and the related RADU scheme. We show that optimal attacks are able to de-anonymize messages mor...
Carmela Troncoso, Claudia Díaz, Emilia K&au...
CSFW
2007
IEEE
15 years 10 months ago
Do As I SaY! Programmatic Access Control with Explicit Identities
We address the programmatic realization of the access control model of security in distributed systems. Our aim is e the gap between abstract/declarative policies and their concre...
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, J...
ACSAC
2002
IEEE
15 years 9 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...
IJCSA
2007
88views more  IJCSA 2007»
15 years 4 months ago
A New Quantitative Trust Model for Negotiating Agents using Argumentation
In this paper, we propose a new quantitative trust model for argumentation-based negotiating agents. The purpose of such a model is to provide a secure environment for agent negot...
Jamal Bentahar, John-Jules Ch. Meyer