Sciweavers

1086 search results - page 48 / 218
» Management of trusted citations
Sort
View
SACMAT
2009
ACM
14 years 4 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
ECRIME
2007
14 years 1 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
ICDE
2006
IEEE
161views Database» more  ICDE 2006»
14 years 4 months ago
Reputation Lending for Virtual Communities
Reputation management schemes have recently emerged as a mechanism for improving trust and security in peer-topeer networks. A new entrant in a network with reputation management ...
Anurag Garg, Alberto Montresor, Roberto Battiti
ICDCSW
2002
IEEE
14 years 2 months ago
Trust-Aware Cooperation
In mobile teamwork environments two basic problems exist: how to discover someone based on a profile (skills, reputations) and how to assess that person’s “credibility” (tr...
Zoran Despotovic, Karl Aberer, Manfred Hauswirth
ICDCSW
2007
IEEE
14 years 4 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato