Sciweavers

947 search results - page 171 / 190
» HMM-Based Trust Model
Sort
View
ACMICEC
2006
ACM
111views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
Passive verification of the strategyproofness of mechanisms in open environments
Consider an open infrastructure in which anyone can deploy mechanisms to support automated decision making and coordination amongst self-interested computational agents. Strategyp...
Laura Kang, David C. Parkes
CGO
2006
IEEE
14 years 1 months ago
Compiler Optimizations to Reduce Security Overhead
In this work, we present several compiler optimizations to reduce the overhead due to software protection. We first propose an aggressive rematerialization algorithm which attempt...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
ESOP
2006
Springer
14 years 1 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam
CCS
2000
ACM
14 years 1 months ago
Accountable certificate management using undeniable attestations
This paper initiates a study of accountable certificate management methods, necessary to support long-term authenticity of digital documents. Our main contribution is a model for ...
Ahto Buldas, Peeter Laud, Helger Lipmaa
OOPSLA
2000
Springer
14 years 1 months ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski