Sciweavers

74 search results - page 9 / 15
» Inferring Trust
Sort
View
USS
2010
13 years 7 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
14 years 9 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
AMAST
2008
Springer
13 years 11 months ago
A Declarative Debugger for Maude
Abstract. Declarative debugging has been applied to many declarative programming paradigms; in this paper, a declarative debugger for rewriting logic specifications, embodied in th...
Adrián Riesco, Alberto Verdejo, Narciso Mar...
ECAI
2010
Springer
13 years 10 months ago
Propagation of Opinions in Structural Graphs
Trust and reputation measures are crucial in distributed open systems where agents need to decide whom or what to choose. Existing work has mainly focused on the reputation of sing...
Nardine Osman, Carles Sierra, Jordi Sabater-Mir
WWW
2007
ACM
14 years 10 months ago
Ontology engineering using volunteer labor
We describe an approach designed to reduce the costs of ontology development through the use of untrained, volunteer knowledge engineers. Results are provided from an experiment i...
Benjamin M. Good, Mark D. Wilkinson