Sciweavers

1139 search results - page 143 / 228
» Trust Management Survey
Sort
View
KBSE
2005
IEEE
14 years 1 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
WWW
2007
ACM
14 years 8 months ago
Simple authentication for the web
Automated email-based password reestablishment (EBPR) is an efficient, cost-effective means to deal with forgotten passwords. In this technique, email providers authenticate users ...
Timothy W. van der Horst, Kent E. Seamons
EDBT
2008
ACM
95views Database» more  EDBT 2008»
14 years 8 months ago
Zerber: r-confidential indexing for distributed documents
To carry out work assignments, small groups distributed within a larger enterprise often need to share documents among themselves while shielding those documents from others'...
Sergej Zerr, Elena Demidova, Daniel Olmedilla, Wol...
ICWS
2009
IEEE
14 years 5 months ago
Behavioral Attestation for Business Processes
Service Oriented Architecture (SOA) is an architectural paradigm that enables dynamic composition of heterogeneous, independent, multi-vendor business services. A prerequisite for...
Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamlee...
IDTRUST
2009
ACM
14 years 2 months ago
Palantir: a framework for collaborative incident response and investigation
Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we ar...
Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Mic...