Sciweavers

3299 search results - page 84 / 660
» Privacy and Trusted Computing
Sort
View
127
Voted
AGENTS
2001
Springer
15 years 7 months ago
Some thoughts on agent trust and delegation
In this paper, we are going to show how to build up agentoriented Public Key Infrastructure(PKI) from SPKI/SDSI and X.509 standards. A variety of delegation mechanisms for agents ...
Yuh-Jong Hu
103
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
114
Voted
ISI
2006
Springer
15 years 2 months ago
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
Ragib Hasan, Marianne Winslett
109
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
100
Voted
SEMWEB
2004
Springer
15 years 8 months ago
Trust Strategies for the Semantic Web
Abstract. Enabling trust on the Semantic Web to ensure more efficient agent interaction is an important research topic. Current research on trust seems to focus on developing comp...
Kieron O'Hara, Harith Alani, Yannis Kalfoglou, Nig...