Sciweavers

334 search results - page 34 / 67
» trust 2010
Sort
View
FGCS
2010
99views more  FGCS 2010»
13 years 8 months ago
A conceptual model for attribute aggregation
This paper describes a conceptual model for attribute aggregation that allows a service provider (SP) to authorise a user’s access request based on attributes asserted by multip...
David W. Chadwick, George Inman, Nate Klingenstein
LORI
2009
Springer
14 years 4 months ago
Dynamic Testimonial Logic
We propose a dynamic testimonial logic (DTL) to model communication and belief change among agents with different dispositions to trust each other as information sources. DTL is ...
Wesley H. Holliday
USS
2010
13 years 7 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
ECCC
2006
87views more  ECCC 2006»
13 years 10 months ago
The Learnability of Quantum States
Traditional quantum state tomography requires a number of measurements that grows exponentially with the number of qubits n. But using ideas from computational learning theory, we...
Scott Aaronson
ENTCS
2007
132views more  ENTCS 2007»
13 years 9 months ago
Building Reputations for Internet Clients
We propose a design of a client reputation system that can be used to reduce unwanted traffic in the Internet. Many reputation systems proposed in the trust literature are provid...
Songjie Wei, Jelena Mirkovic