Sciweavers

116 search results - page 5 / 24
» Verifying the SET Purchase Protocols
Sort
View
TOPLAS
2008
101views more  TOPLAS 2008»
13 years 7 months ago
Verifying policy-based web services security
WS-SecurityPolicy is a declarative language for configuring web services security mechanisms. We describe a formal semantics for WS-SecurityPolicy and propose a more abstract lang...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
AAAI
2006
13 years 9 months ago
Mechanisms for Partial Information Elicitation: The Truth, but Not the Whole Truth
We examine a setting in which a buyer wishes to purchase probabilistic information from some agent. The seller must invest effort in order to gain access to the information, and m...
Aviv Zohar, Jeffrey S. Rosenschein
CCS
2011
ACM
12 years 7 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
KBS
2002
88views more  KBS 2002»
13 years 7 months ago
Detecting mismatches among experts' ontologies acquired through knowledge elicitation
: We have constructed a set of ontologies modelled on conceptual structures elicited from several domain experts. Protocols were collected from various experts who advise on the se...
Adil Hameed, Derek H. Sleeman, Alun D. Preece
ECR
2006
81views more  ECR 2006»
13 years 7 months ago
Reputation management and signature delegation: A distributed approach
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
Omaima Bamasak, Ning Zhang