Sciweavers

2821 search results - page 75 / 565
» To Trust or Not to Trust
Sort
View
ESAS
2006
Springer
14 years 16 days ago
Cryptographic Protocol to Establish Trusted History of Interactions
In the context of ambient networks, this article describes a cryptographic protocol called Common History Extraction (CHE) protocol implementing a trust management framework. All t...
Samuel Galice, Marine Minier, John Mullins, St&eac...
USENIX
2003
13 years 10 months ago
The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0
We explore the requirements, design, and implementation of the TrustedBSD MAC Framework. The TrustedBSD MAC Framework, integrated into FreeBSD 5.0, provides a flexible framework ...
Robert Watson, Wayne Morrison, Chris Vance, Brian ...
WAC
2005
Springer
122views Communications» more  WAC 2005»
14 years 2 months ago
Trust Management Issues for Ad Hoc and Self-organized Networks
Self-organized and ad hoc communications have many fundamental principles in common and also face similar problems in the domains of security and Quality of Service. Trust manageme...
Vassileios Tsetsos, Giannis F. Marias, Sarantis Pa...
ICISC
2001
89views Cryptology» more  ICISC 2001»
13 years 10 months ago
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
In 1999, Bao et al. proposed [5] a multi-party fair exchange protocol of electronic items with an offline trusted third party. In this protocol, a coalition including the initiator...
Nicolás González-Deleito, Olivier Ma...
ITRUST
2005
Springer
14 years 2 months ago
Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences
Collaborative Filtering (CF), the prevalent recommendation approach, has been successfully used to identify users that can be characterized as “similar” according to their logg...
Manos Papagelis, Dimitris Plexousakis, Themistokli...