Sciweavers

671 search results - page 131 / 135
» Trust evaluation in ad-hoc networks
Sort
View
PERCOM
2009
ACM
14 years 4 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
SIGCOMM
2010
ACM
13 years 10 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
ICSE
2004
IEEE-ACM
14 years 10 months ago
Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems
Because it takes time and trust to establish agreement, traditional consensus-based architectural styles cannot safely accommodate resources that change faster than it takes to tr...
Rohit Khare, Richard N. Taylor
ISCC
2005
IEEE
14 years 3 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
EUROSYS
2010
ACM
14 years 2 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry