Sciweavers

334 search results - page 38 / 67
» trust 2010
Sort
View
SACMAT
2010
ACM
14 years 2 months ago
A model of triangulating environments for policy authoring
Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
Kathi Fisler, Shriram Krishnamurthi
ESWS
2010
Springer
14 years 2 months ago
Reactive Policies for the Semantic Web
Semantic Web policies are general statements defining the behavior of a system that acts on behalf of real users. These policies have various applications ranging from dynamic age...
Piero A. Bonatti, Philipp Kärger, Daniel Olme...
NSDI
2010
13 years 11 months ago
Prophecy: Using History for High-Throughput Fault Tolerance
Byzantine fault-tolerant (BFT) replication has enjoyed a series of performance improvements, but remains costly due to its replicated work. We eliminate this cost for read-mostly ...
Siddhartha Sen, Wyatt Lloyd, Michael J. Freedman
JUCS
2010
143views more  JUCS 2010»
13 years 8 months ago
Information Support Services for Intermediation Tasks of Collaborative Networks
: Companies in collaborative networks require intermediation to perform. The collaborative network forms the breeding environment for the configuration of a Virtual Enterprise that...
Heiko Thimm, Karsten Boye Rasmussen
GLOBECOM
2010
IEEE
13 years 7 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...