Sciweavers

3299 search results - page 85 / 660
» Privacy and Trusted Computing
Sort
View
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
13 years 8 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
ACMDIS
2004
ACM
14 years 2 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
JUCS
2010
162views more  JUCS 2010»
13 years 7 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
14 years 10 months ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...
WSPI
2008
13 years 10 months ago
Possibilities and Limitations of Modeling Trust and Reputation
Abstract. We all highly depend and rely on the trustworthiness of information and services provided by various parties and institutions. Reputation systems are one possibility to s...
Andreas Gutscher, Jessica Heesen, Oliver Siemoneit