Sciweavers

4897 search results - page 105 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
IFIP
2005
Springer
14 years 2 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
SAINT
2008
IEEE
14 years 3 months ago
A Sybil-Resilient Reputation Metric for P2P Applications
In this paper, we propose a reputation-based trust model for P2P applications and study it a security framework. This framework makes it easy to reason about the resilience of the...
Tien Tuan Anh Dinh, Mark Ryan
CCS
2009
ACM
14 years 1 months ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
RAS
1998
81views more  RAS 1998»
13 years 9 months ago
Towards a theory of delegation for agent-based systems
In this paper a theory of delegation is presented. There are at least three reasons for developing such a theory. First, one of the most relevant notions of "agent" is b...
Cristiano Castelfranchi, Rino Falcone
HICSS
1997
IEEE
109views Biometrics» more  HICSS 1997»
14 years 1 months ago
Performance Evaluation of a C++ Library Based Multithreaded System
One model of multithreading gaining popularity on multiprocessor systems is the message-driven model of computation. The message-driven model is a reactive model in which an arriv...
John G. Holm, Steven Parkes, Prithviraj Banerjee