Sciweavers

129 search results - page 9 / 26
» Trust by design: information requirements for appropriate tr...
Sort
View
TRUSTBUS
2007
Springer
14 years 2 months ago
Usage Control in Service-Oriented Architectures
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty
SISW
2005
IEEE
14 years 1 months ago
File System Design with Assured Delete
This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports ...
Radia J. Perlman
ATAL
2009
Springer
14 years 2 months ago
Pragmatic-strategic reputation-based decisions in BDI agents
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the...
Isaac Pinyol, Jordi Sabater-Mir
EXACT
2007
13 years 10 months ago
PML 2: A Modular Explanation Interlingua
In the past five years, we have designed and evolved an interlingua for sharing explanations generated by various automated systems such as hybrid web-based question answering sys...
Deborah L. McGuinness, Li Ding, Paulo Pinheiro da ...
SAJ
2002
97views more  SAJ 2002»
13 years 7 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier