Sciweavers

271 search results - page 11 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
IFIP
2009
Springer
14 years 2 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
IPPS
2007
IEEE
14 years 2 months ago
Leakage Energy Reduction in Value Predictors through Static Decay
As process technology advances toward deep submicron (below 90nm), static power becomes a new challenge to address for energy-efficient high performance processors, especially for...
Juan M. Cebrian, Juan L. Aragón, José...
DOCENG
2003
ACM
14 years 1 months ago
Management of trusted citations
We discuss how references and citations within a document to particular sources can be verified and guaranteed. When a document refers through a quotation to another document, th...
Christer Fernström
TKDE
2010
135views more  TKDE 2010»
13 years 6 months ago
A Rule-Based Trust Negotiation System
—Open distributed environments such as the World Wide Web facilitate information sharing but provide limited support to the protection of sensitive information and resources. Tru...
Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedil...
ECAI
2006
Springer
13 years 11 months ago
Identifying Inter-Domain Similarities Through Content-Based Analysis of Hierarchical Web-Directories
Providing accurate personalized information services to the users requires knowing their interests and needs, as defined by their User Models (UMs). Since the quality of the person...
Shlomo Berkovsky, Dan Goldwasser, Tsvi Kuflik, Fra...