Sciweavers

4111 search results - page 106 / 823
» Security, Protocols, and Trust
Sort
View
SACMAT
2005
ACM
14 years 3 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
CCS
2010
ACM
13 years 8 months ago
Assessing trust in uncertain information using Bayesian description logic
Decision makers (humans or software agents alike) are faced with the challenge of examining large volumes of information originating from heterogeneous sources with the goal of as...
Achille Fokoue, Mudhakar Srivatsa, Robert Young
CISIS
2010
IEEE
14 years 5 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
CSFW
2003
IEEE
14 years 3 months ago
A Derivation System for Security Protocols and its Logical Formalization
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
CSFW
2006
IEEE
14 years 1 months ago
Verified Interoperable Implementations of Security Protocols
Karthikeyan Bhargavan, Cédric Fournet, Andr...