-
2
-
-
84957006898
-
Access control and trust in the use of widely distributed services
-
Proceedings Middleware 2001
-
J. Bacon, K. Moody, and W. Yao. Access control and trust in the use of widely distributed services. In Proceedings Middleware 2001, Lecture Notes in Computer Science 2218, pp. 295-310, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2218
, pp. 295-310
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
7
-
-
84871044906
-
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
-
Minneapolis, MN Oct.
-
C. Dellarocas. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of the 2nd ACM Conference on Electronic Commerce, pp. 150-157, Minneapolis, MN, Oct. 2000.
-
(2000)
Proceedings of the 2nd ACM Conference on Electronic Commerce
, pp. 150-157
-
-
Dellarocas, C.1
-
8
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public key infrastructure
-
C. Ellison and B. Schneier. Ten risks of PKI: What you're not being told about public key infrastructure. Computer Security Journal, 16(1):1-7, 2000.
-
(2000)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
9
-
-
0033204106
-
On power-law relationships of the internet topology
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. In SIGCOMM 1999, pp. 251-262, 1999.
-
(1999)
SIGCOMM
, vol.1999
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
10
-
-
0035331939
-
Congestion control mechanisms and the best effort service model
-
P. Gevros, J. Crowcroft, P. Kirstein, and S. Bhatt. Congestion control mechanisms and the best effort service model. IEEE Network, 15(3):16-26, 2001.
-
(2001)
IEEE Network
, vol.15
, Issue.3
, pp. 16-26
-
-
Gevros, P.1
Crowcroft, J.2
Kirstein, P.3
Bhatt, S.4
-
11
-
-
0011595722
-
-
Technical Report MCM-institute-1999-01, University of St Gallen
-
M. Gisler, H. Häuschen, Y. Jöhri, A. Meier, O. Müller, B. Schopp, and K. Stanoevska. Requirements on secure electronic contracts. Technical Report MCM-institute-1999-01, University of St Gallen, 1999.
-
(1999)
Requirements on Secure Electronic Contracts
-
-
Gisler, M.1
Häuschen, H.2
Jöhri, Y.3
Meier, A.4
Müller, O.5
Schopp, B.6
Stanoevska, K.7
-
12
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2
-
L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In USENIX Symposium on Internet Technologies and Systems, pp. 103-112, 1997.
-
(1997)
USENIX Symposium on Internet Technologies and Systems
, pp. 103-112
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
13
-
-
0028989316
-
The greater generosity of the spatialized prisonersdilemma
-
Apr.
-
P. Grim. The greater generosity of the spatialized prisonersdilemma. Journal of Theoretical Biology, 173(4):353-359, Apr. 1995.
-
(1995)
Journal of Theoretical Biology
, vol.173
, Issue.4
, pp. 353-359
-
-
Grim, P.1
-
16
-
-
0031540743
-
Application performance and flexibility on exokernel systems
-
M. F. Kaashoek, D. R. Engler, G. R. Ganger, H. M. Briceño, R. Hunt, D. Mazières, T. Pinckney, R. Grimm, J. Janotti, and K. Mackenzie. Application performance and flexibility on exokernel systems. In Symposium on Operating Systems Principles, pp. 52-65, 1997.
-
(1997)
Symposium on Operating Systems Principles
, pp. 52-65
-
-
Kaashoek, M.F.1
Engler, D.R.2
Ganger, G.R.3
Briceño, H.M.4
Hunt, R.5
Mazières, D.6
Pinckney, T.7
Grimm, R.8
Janotti, J.9
MacKenzie, K.10
-
17
-
-
77957870609
-
Prisoner's dilemma
-
E. N. Zalta, editor Stanford University, Stanford, CA, summer 2001 edition [Online]. Available
-
S. T. Kuhn. Prisoner's dilemma. In E. N. Zalta, editor, The Stanford Encyclopedia of Philosophy. Stanford University, Stanford, CA, summer 2001 edition, 2001. [Online]. Available: http://plato.stanford.edu/archives/sum2001/ entries/prisoner-dilemma/.
-
(2001)
The Stanford Encyclopedia of Philosophy
-
-
Kuhn, S.T.1
-
19
-
-
84893041537
-
-
PPARC Jan. [Online]. Available
-
PPARC. Internet to SuperNet-the DATAGRID project, Jan. 2001. [Online]. Available: http://www.pparc. ac.uk/nw/supernet.asp.
-
(2001)
Internet to SuperNet-the DATAGRID Project
-
-
-
20
-
-
0032636223
-
Xenoservers: Accountable execution of untrusted code
-
Mar.
-
D. Reed, I. Pratt, P. Menage, S. Early, and N. Stratford. Xenoservers: accountable execution of untrusted code. In IEEE Hot Topics in Operating Systems (HotOS) VII, pp. 136-141, Mar. 1999.
-
(1999)
IEEE Hot Topics in Operating Systems (HotOS)
, vol.7
, pp. 136-141
-
-
Reed, D.1
Pratt, I.2
Menage, P.3
Early, S.4
Stratford, N.5
-
21
-
-
0003101953
-
Issues in automated negotiation and electronic commerce: Extending the contract net framework
-
San Fransisco
-
T. Sandholm and V. Lesser. Issues in automated negotiation and electronic commerce: Extending the contract net framework. In First International Conference on Multiagent Systems (ICMAS-95), pp. 328-335, San Fransisco, 1995.
-
(1995)
First International Conference on Multiagent Systems (ICMAS-95)
, pp. 328-335
-
-
Sandholm, T.1
Lesser, V.2
-
23
-
-
53249142256
-
Formalizing and securing relationships on public networks
-
[Online]. Available
-
N. Szabo. Formalizing and securing relationships on public networks. First Monday, 2(9), 1997. [Online]. Available: http://www.firstmonday.dk/.
-
(1997)
First Monday
, vol.2
, Issue.9
-
-
Szabo, N.1
-
26
-
-
0031334402
-
A quantitative comparison of graph-based models for Internet topology
-
E. W. Zegura, K. L. Calvert, and M. J. Donahoo. A quantitative comparison of graph-based models for Internet topology. IEEE/ACM Transactions on Networking, 5(6):770-783, 1997.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 770-783
-
-
Zegura, E.W.1
Calvert, K.L.2
Donahoo, M.J.3
|