Sciweavers

4794 search results - page 119 / 959
» Trust-Based Mechanism Design
Sort
View
149
Voted
P2P
2003
IEEE
157views Communications» more  P2P 2003»
15 years 9 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
141
Voted
ATAL
2008
Springer
15 years 5 months ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
182
Voted
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 7 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
100
Voted
CCS
2001
ACM
15 years 8 months ago
Dynamic Self-Checking Techniques for Improved Tamper Resistance
We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for ...
Bill G. Horne, Lesley R. Matheson, Casey Sheehan, ...
137
Voted
ISCAPDCS
2004
15 years 5 months ago
Decentralized and Hierarchical Discovery of Software Applications in the iShare Internet Sharing System
We present the design and evaluation of a fully decentralized software application discovery scheme
Xiaojuan Ren, Zhelong Pan, Rudolf Eigenmann, Y. Ch...