Sciweavers

4897 search results - page 37 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
DMSN
2010
ACM
13 years 9 months ago
Provenance-based trustworthiness assessment in sensor networks
As sensor networks are being increasingly deployed in decisionmaking infrastructures such as battlefield monitoring systems and SCADA(Supervisory Control and Data Acquisition) sys...
Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino
ESORICS
2008
Springer
13 years 10 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
IJWIS
2007
153views more  IJWIS 2007»
13 years 9 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
COLCOM
2005
IEEE
14 years 2 months ago
The Nizza secure-system architecture
The trusted computing bases (TCBs) of applications running on today’s commodity operating systems have become extremely large. This paper presents an architecture that allows to...
Hermann Härtig, Michael Hohmuth, Norman Feske...
CSREASAM
2006
13 years 10 months ago
Modeling Role-based Trust and Authority in Open Environments
Trust and authority are essential components that must be factored in designing and implementing a distributed access control mechanism for open environments. This paper presents ...
Dongwan Shin