Sciweavers

57 search results - page 6 / 12
» Extending Trust in Peer-to-Peer Networks
Sort
View
SACMAT
2004
ACM
14 years 1 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
AINA
2007
IEEE
14 years 2 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
NDSS
1997
IEEE
13 years 11 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
WWW
2010
ACM
14 years 2 months ago
The anatomy of a large-scale social search engine
We present Aardvark, a social search engine. With Aardvark, users ask a question, either by instant message, email, web input, text message, or voice. Aardvark then routes the que...
Damon Horowitz, Sepandar D. Kamvar
DCOSS
2007
Springer
13 years 11 months ago
Efficient and Distributed Access Control for Sensor Networks
Sensor networks are often used to sense the physical world and provide observations for various uses. In hostile environments, it is critical to control the network access to ensur...
Donggang Liu