Sciweavers

334 search results - page 19 / 67
» trust 2010
Sort
View
ENTCS
2010
130views more  ENTCS 2010»
13 years 10 months ago
Compositional System Security with Interface-Confined Adversaries
This paper presents a formal framework for compositional reasoning about secure systems. A key insight is to view a trusted system in terms of the interfaces that the various comp...
Deepak Garg, Jason Franklin, Dilsun Kirli Kaynar, ...
ENTCS
2007
79views more  ENTCS 2007»
13 years 9 months ago
Towards Trustworthy Spatial Messaging
Spatial messaging is a term that defines the virtual publication of data in physical places. Generally, anyone in the neighborhood of such a publication point gets the message. F...
Michel Deriaz, Jean-Marc Seigneur
IFIPTM
2010
117views Management» more  IFIPTM 2010»
13 years 8 months ago
Leveraging a Social Network of Trust for Promoting Honesty in E-Marketplaces
Abstract. In this paper, we examine a trust-based framework for promoting honesty in e-marketplaces that relies on buyers forming social networks to share reputation ratings of sel...
Jie Zhang, Robin Cohen, Kate Larson
CCS
2010
ACM
14 years 4 months ago
A game theoretic model for digital identity and trust in online communities
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Tansu Alpcan, Cengiz Örencik, Albert Levi, Er...
ENTCS
2006
80views more  ENTCS 2006»
13 years 9 months ago
Synchronisation in Trust Management Using Push Authorisation
Traditional trust management authorisation decisions for distributed technologies, are, in general, based on the history of the authorisations/computation to date. We consider thi...
Thomas B. Quillinan, Simon N. Foley