Sciweavers

1086 search results - page 147 / 218
» Management of trusted citations
Sort
View
DEBU
2007
141views more  DEBU 2007»
13 years 10 months ago
Issues in Building Practical Provenance Systems
The importance of maintaining provenance has been widely recognized, particularly with respect to highly-manipulated data. However, there are few deployed databases that provide p...
Adriane Chapman, H. V. Jagadish
IDT
2007
83views more  IDT 2007»
13 years 10 months ago
Negotiating flexible agreements by combining distributive and integrative negotiation
This paper presents an approach to automated negotiation between agents which attempts to combine the advantages of a co-operative value adding approach, with the reality that neg...
Quoc Bao Vo, Lin Padgham, Lawrence Cavedon
PUC
2006
72views more  PUC 2006»
13 years 10 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
COMCOM
2002
105views more  COMCOM 2002»
13 years 9 months ago
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services m...
Steve Kremer, Olivier Markowitch, Jianying Zhou
CCS
2010
ACM
13 years 8 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi