Sciweavers

202 search results - page 12 / 41
» Foundations for group-centric secure information sharing mod...
Sort
View
POPL
2004
ACM
14 years 7 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
EKAW
2010
Springer
13 years 6 months ago
Representing, Proving and Sharing Trustworthiness of Web Resources Using Veracity
The World Wide Web has evolved into a distributed network of web applications facilitating the publication of information on a large scale. Judging whether such information can be ...
Grégoire Burel, Amparo Elizabeth Cano, Matt...
WAIM
2010
Springer
13 years 5 months ago
Trustworthy Information: Concepts and Mechanisms
We used to treating information received (from recognized sources) as trustworthy, which is unfortunately not true because of attacks. The situation can get worse with the emerging...
Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin ...
CSFW
2006
IEEE
14 years 1 months ago
A Framework for Establishing Decentralized Secure Coalitions
A coalition provides a virtual space across a network that allows its members to interact in a transparent manner. Coalitions may be formed for a variety of purposes. These range ...
Hongbin Zhou, Simon N. Foley
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 1 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp