Sciweavers

791 search results - page 57 / 159
» Users and Trust in Cyberspace
Sort
View
TKDE
2010
135views more  TKDE 2010»
13 years 6 months ago
A Rule-Based Trust Negotiation System
—Open distributed environments such as the World Wide Web facilitate information sharing but provide limited support to the protection of sensitive information and resources. Tru...
Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedil...
ICICS
2005
Springer
14 years 1 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
GRID
2005
Springer
14 years 1 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...
BMCBI
2007
146views more  BMCBI 2007»
13 years 7 months ago
Towards Semantic e-Science for Traditional Chinese Medicine
Background: Recent advances in Web and information technologies with the increasing decentralization of organizational structures have resulted in massive amounts of information r...
Huajun Chen, Yuxin Mao, Xiaoqing Zheng, Meng Cui, ...
ICSOC
2005
Springer
14 years 1 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...