Sciweavers

1229 search results - page 162 / 246
» Trusted Computing
Sort
View
WWW
2005
ACM
14 years 2 months ago
Preferential walk: towards efficient and scalable search in unstructured peer-to-peer networks
To improve search efficiency and reduce unnecessary traffic in Peerto-Peer (P2P) networks, this paper proposes a trust-based probabilistic search algorithm, called preferential wa...
Hai Zhuge, Xue Chen, Xiaoping Sun
WINE
2005
Springer
149views Economy» more  WINE 2005»
14 years 2 months ago
Enforcing Truthful Strategies in Incentive Compatible Reputation Mechanisms
Abstract. We commonly use the experience of others when taking decisions. Reputation mechanisms aggregate in a formal way the feedback collected from peers and compute the reputati...
Radu Jurca, Boi Faltings
NSPW
2004
ACM
14 years 2 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
GCC
2004
Springer
14 years 2 months ago
A New Grid Security Framework with Dynamic Access Control
Abstract. In this paper, a new Grid security framework based on dynamic access control is introduced to address some security problem in Grid. Based on the dynamic evaluating resul...
Bing Xie, Xiaolin Gui, Yinan Li, Depei Qian
HIPC
2004
Springer
14 years 2 months ago
An Incentive Driven Lookup Protocol for Chord-Based Peer-to-Peer (P2P) Networks
In this paper we describe a novel strategy for carrying out lookups in Chord-based peer-to-peer (P2P) networks, wherein nodes are assumed to behave selfishly. This is in contrast ...
Rohit Gupta, Arun K. Somani