Sciweavers

334 search results - page 22 / 67
» Survey of trust models in different network domains
Sort
View
INTR
2007
81views more  INTR 2007»
13 years 7 months ago
Network externality and future usage of Internet services
Purpose – The purpose of this paper is to investigate different effects of three network externality factors, i.e. local network size, network strength, and total network size, ...
Sung Yong Chun, Minhi Hahn
IAT
2005
IEEE
14 years 1 months ago
Modelling Multiagent Bayesian Networks with Inclusion Dependencies
Multiagent Bayesian networks (MABNs) are a powerful new framework for uncertainty management in a distributed environment. In a MABN, a collective joint probability distribution i...
Cory J. Butz
POLICY
2007
Springer
14 years 1 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
NSPW
1998
ACM
13 years 12 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
NDSS
2005
IEEE
14 years 1 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot