Sciweavers

90 search results - page 11 / 18
» Toward a Usage-Based Security Framework for Collaborative Co...
Sort
View
DSN
2009
IEEE
14 years 2 months ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
14 years 1 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
CCS
2005
ACM
14 years 1 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
PERCOM
2005
ACM
14 years 7 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
SIGIR
2002
ACM
13 years 7 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny