Sciweavers

344 search results - page 20 / 69
» trust 2009
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
A Generic Security API for Symmetric Key Management on Cryptographic Devices
Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a new generi...
Véronique Cortier, Graham Steel
ATAL
2009
Springer
14 years 3 months ago
Smart cheaters do prosper: defeating trust and reputation systems
Traders in electronic marketplaces may behave dishonestly, cheating other agents. A multitude of trust and reputation systems have been proposed to try to cope with the problem of...
Reid Kerr, Robin Cohen
EUROMICRO
2009
IEEE
14 years 3 months ago
The Cycle of Trust in Mixed Service-Oriented Systems
—Many collaboration platforms are realized as service-oriented systems enabling flexible compositions of services and support of interactions. Interactions between entities in s...
Florian Skopik, Daniel Schall, Schahram Dustdar
INFOCOM
2009
IEEE
14 years 3 months ago
TRUST: A General Framework for Truthful Double Spectrum Auctions
— We design truthful double spectrum auctions where multiple parties can trade spectrum based on their individual needs. Open, market-based spectrum trading motivates existing sp...
Xia Zhou, Haitao Zheng
TRUST
2009
Springer
14 years 3 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi