Sciweavers

712 search results - page 26 / 143
» Secure Data Management in Trusted Computing
Sort
View
WWW
2007
ACM
14 years 9 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
SAC
2004
ACM
14 years 2 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
SACMAT
2004
ACM
14 years 2 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
IEEESCC
2008
IEEE
14 years 3 months ago
A Secure Information Flow Architecture for Web Services
Current web service platforms (WSPs) often perform all web services-related processing, including securitysensitive information handling, in the same protection domain. Consequent...
Lenin Singaravelu, Jinpeng Wei, Calton Pu
ISPA
2005
Springer
14 years 2 months ago
The Application of Collaborative Filtering for Trust Management in P2P Communities
The open and anonymous nature of P2P services opens the door to malicious peers who cause the loss of trust by providing corrupted data or
Min Zuo, Kai Wang, Jianhua Li