Sciweavers

132 search results - page 25 / 27
» Privacy-Preserving Trust Negotiations
Sort
View
CIS
2007
Springer
14 years 1 months ago
Controlled Secret Leakage
— Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others. How to ...
Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan ...
ISCC
2005
IEEE
14 years 1 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
PODC
2003
ACM
14 years 19 days ago
Oblivious signature-based envelope
We propose a new cryptographic primitive called oblivious signaturebased envelope (OSBE). Informally, an OSBE scheme enables a sender to send an envelope (encrypted message) to a ...
Ninghui Li, Wenliang Du, Dan Boneh
SAC
2009
ACM
14 years 2 days ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
ATAL
2007
Springer
13 years 11 months ago
Reputation in the joint venture game
In many settings, agents need to identify competent partners to assist them in accomplishing tasks. Direct experience may not provide sufficient data to learn the competence of ot...
Philip Hendrix, Barbara J. Grosz