Sciweavers

2821 search results - page 62 / 565
» To Trust or Not to Trust
Sort
View
P2P
2005
IEEE
106views Communications» more  P2P 2005»
14 years 2 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
ATVA
2007
Springer
89views Hardware» more  ATVA 2007»
14 years 3 months ago
Policies and Proofs for Code Auditing
Abstract. Both proofs and trust relations play a role in security decisions, in particular in determining whether to execute a piece of code. We have developed a language, called B...
Nathan Whitehead, Jordan Johnson, Martín Ab...
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 10 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
MOBIMEDIA
2007
13 years 10 months ago
Implementation aspects of a delegation system
In this paper we simulate an authorization and delegation system using knowledge based technology. This proposal is part of a visual tool that is intended to be an implementation ...
Isaac Agudo, Javier Lopez, José A. Monteneg...
HICSS
2005
IEEE
135views Biometrics» more  HICSS 2005»
14 years 2 months ago
The Rules of Virtual Groups
Concerns about virtual groups include how members develop trust and liking for partners. Previous studies have explored behavioral variables leading to subjectively-experienced tr...
Joseph B. Walther, Ulla Bunz, Natalia N. Bazarova