Sciweavers

27 search results - page 4 / 6
» Trusted Autonomy
Sort
View
CSFW
2008
IEEE
14 years 2 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
DISCEX
2003
IEEE
14 years 28 days ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...
DEXAW
1999
IEEE
98views Database» more  DEXAW 1999»
13 years 12 months ago
Shaping the Research Agenda for Security in E-Commerce
In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applicat...
Rolf Oppliger
HICSS
2008
IEEE
139views Biometrics» more  HICSS 2008»
14 years 2 months ago
Understanding the Roles of Knowledge Sharing and Trust in Online Learning Communities
This paper builds upon action and design research aimed at enhancing scholarly community and conversation in a graduate school setting. In this paper we focus on knowledge sharing...
Brian Thoms, Nathan Garrett, Jesus Canelon Herrera...
CHI
2009
ACM
14 years 2 months ago
Awareness, training and trust in interaction with adaptive spam filters
Even though adaptive (trainable) spam filters are a common example of systems that make (semi-)autonomous decisions on behalf of the user, trust in these filters has been underexp...
Henriette S. M. Cramer, Vanessa Evers, Maarten van...