Sciweavers

4897 search results - page 127 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 1 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
CCS
2008
ACM
15 years 6 months ago
Black-box accountable authority identity-based encryption
A well-known concern in the setting of identity based encryption is that the PKG is all powerful and has to be completely trusted. To mitigate this problem, the notion of Accounta...
Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters
POLICY
2004
Springer
15 years 9 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
153
Voted
CCS
2005
ACM
15 years 9 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
ICDIM
2006
IEEE
15 years 10 months ago
Model-Driven Development of Content-Based Image Retrieval Systems
: Generic systems for content-based image retrieval (CBIR), such as QBIC [7] cannot be used to solve domain-specific image retrieval problems, as for example, the identification of...
Temenushka Ignatova