Sciweavers

135 search results - page 22 / 27
» Sesame: informing user security decisions with system visual...
Sort
View
ENVSOFT
2002
187views more  ENVSOFT 2002»
13 years 7 months ago
AVTOP: a full integration of TOPMODEL into GIS
The integration of environmental models and Geographical Information Systems (GIS) usually takes two approaches: loose coupling and tight coupling. This paper, however, presents a...
Bo Huang, Bin Jiang
ITNG
2008
IEEE
14 years 1 months ago
A Framework for Agent-Based Trust Management in Online Auctions
Current electronic commerce applications such as online auction systems are not trustworthy due to a lack of effective trust management mechanisms. A trustworthy online auction sy...
Haiping Xu, Sol M. Shatz, Christopher K. Bates
CCS
2004
ACM
14 years 23 days ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
MMMACNS
2005
Springer
14 years 26 days ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 19 days ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu