Sciweavers

1715 search results - page 76 / 343
» Trust and Reputation Systems
Sort
View
JHSN
2006
267views more  JHSN 2006»
13 years 9 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
CN
2004
163views more  CN 2004»
13 years 9 months ago
Highly reliable trust establishment scheme in ad hoc networks
Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...
P2P
2008
IEEE
149views Communications» more  P2P 2008»
14 years 4 months ago
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
Brent Lagesse, Mohan Kumar, Matthew Wright
JCIT
2008
159views more  JCIT 2008»
13 years 9 months ago
QoS-Aware Web Services Discovery with Trust Management
As the number of available Web services increases, there is a growing demand to find the service that best fits the user's requirements. Especially, when a set of services fu...
Yukyong Kim
CCGRID
2008
IEEE
14 years 4 months ago
Reputation-Based Estimation of Individual Performance in Grids
Hidden information is a critical issue for the successful delivery of SLAs in grid systems. It arises when the agents (hardware and software resources) employed to serve a task be...
Thanasis G. Papaioannou, George D. Stamoulis