Sciweavers

4111 search results - page 100 / 823
» Security, Protocols, and Trust
Sort
View
CCS
2006
ACM
14 years 1 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
ACMSE
2005
ACM
14 years 3 months ago
Token-based dynamic trust establishment for web services
Despite recent advances in trust relationship control mechanisms, issues remain that impede the development of effective trust models. One of these is the lack of dynamic mechanis...
Zhengping Wu, Alfred C. Weaver
IFIPTM
2010
140views Management» more  IFIPTM 2010»
13 years 8 months ago
Shinren: Non-monotonic Trust Management for Distributed Systems
Abstract. The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust ma...
Changyu Dong, Naranker Dulay
TRUST
2010
Springer
13 years 8 months ago
The Role of Soft Information in Trust Building: Evidence from Online Social Lending
We analyze empirical data of Germany’s largest online social lending platform Smava.de to exemplarily study the contribution of unstructured, ambiguous, or unverified informatio...
Stefanie Pötzsch, Rainer Böhme
FOSAD
2007
Springer
14 years 4 months ago
An Introduction to the Role Based Trust Management Framework RT
Marcin Czenko, Sandro Etalle, Dongyi Li, William H...