Sciweavers

3299 search results - page 84 / 660
» Privacy and Trusted Computing
Sort
View
AGENTS
2001
Springer
14 years 1 months ago
Some thoughts on agent trust and delegation
In this paper, we are going to show how to build up agentoriented Public Key Infrastructure(PKI) from SPKI/SDSI and X.509 standards. A variety of delegation mechanisms for agents ...
Yuh-Jong Hu
ACSAC
2004
IEEE
14 years 17 days ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
ISI
2006
Springer
13 years 8 months ago
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
Ragib Hasan, Marianne Winslett
IEEEARES
2006
IEEE
14 years 2 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
SEMWEB
2004
Springer
14 years 2 months ago
Trust Strategies for the Semantic Web
Abstract. Enabling trust on the Semantic Web to ensure more efficient agent interaction is an important research topic. Current research on trust seems to focus on developing comp...
Kieron O'Hara, Harith Alani, Yannis Kalfoglou, Nig...