The trusted computing bases (TCBs) of applications running on today’s commodity operating systems have become extremely large. This paper presents an architecture that allows to...
Agent systems are highly distributed and feature widespread coordination and collaboration. Because of these characteristics, a traditional object oriented approach to software de...
—Collaborative systems available on the Web allow millions of users to share information through a growing collection of tools and platforms such as wikis, blogs and shared forum...
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...