This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens...
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
—The concept of groups is a natural aspect of most collaboration scenarios. Group-Centric Secure Information Sharing models (g-SIS) have been recently proposed in which users and...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
— Reputation systems can be used in online markets and communities in order to stimulate quality and good behaviour as well as to sanction poor quality and bad behaviour. The bas...