Sciweavers

836 search results - page 31 / 168
» Privacy and Trust in Distributed Networks
Sort
View
138
Voted
POLICY
2005
Springer
15 years 9 months ago
Driving and Monitoring Provisional Trust Negotiation with Metapolicies
We introduce the provisional trust negotiation framework PROTUNE, for combining distributed trust management policies with provisional-style business rules and accesscontrol relat...
Piero A. Bonatti, Daniel Olmedilla
102
Voted
ICPPW
2003
IEEE
15 years 9 months ago
Trusting Routers and Relays in Ad hoc Networks
The current generation of ad hoc networks relies on other nodes in the network for routing information and for routing the packets. These networks are based on the fundamental ass...
Prashant Dewan, Partha Dasgupta
ATAL
2005
Springer
15 years 9 months ago
Decentralized voting with unconditional privacy
The aggregation of conflicting preferences is a key issue in multiagent systems. Due to its universality, voting has a central role among preference aggregation mechanisms. Votin...
Felix Brandt, Tuomas Sandholm
121
Voted
AINA
2007
IEEE
15 years 10 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
131
Voted
ICICS
2009
Springer
15 years 1 months ago
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications. However, current TCG attestation architecture req...
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei S...