Sciweavers

282 search results - page 17 / 57
» Private Policy Negotiation
Sort
View
SIGECOM
2008
ACM
127views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Posted prices vs. negotiations: an asymptotic analysis
Full revelation of private values is impractical in many large-scale markets, where posted price mechanisms are a simpler alternative. In this work, we compare the asymptotic beha...
Liad Blumrosen, Thomas Holenstein
POLICY
2007
Springer
14 years 1 months ago
A Socio-cognitive Approach to Modeling Policies in Open Environments
The richness of today’s electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current intera...
Tatyana Ryutov
WPES
2004
ACM
14 years 24 days ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
GECON
2007
Springer
132views Business» more  GECON 2007»
14 years 1 months ago
Enabling the Simulation of Service-Oriented Computing and Provisioning Policies for Autonomic Utility Grids
A key issue in utility computing environments, such as utility Grids, is the provisioning, orchestration and allocation of resources to services. In these environments, providers ...
Marcos Dias de Assunção, Werner Stre...
WWW
2007
ACM
14 years 8 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh