-
1
-
-
84860086990
-
-
http://www.ebay.com.
-
-
-
-
2
-
-
84860075384
-
Trust negotiation in peer-to-peer systems
-
in progress
-
Trust negotiation in peer-to-peer systems. Technical Report (in progress), 2004, available at http://scens.cs.dartmouth.edu.
-
(2004)
Technical Report
-
-
-
5
-
-
0003293531
-
Free riding on gnutella
-
October
-
E. Adar. and B.A. Huberman. Free riding on gnutella. First Monday, 5(10), October 2000.
-
(2000)
First Monday
, vol.5
, Issue.10
-
-
Adar, E.1
Huberman, B.A.2
-
6
-
-
0034444963
-
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
-
ACM Press
-
William J. Bolosky, John R. Douceur, David Ely, and Marvin Theimer. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. In Proceedings of the 2000 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pages 34-43. ACM Press, 2000.
-
(2000)
Proceedings of the 2000 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems
, pp. 34-43
-
-
Bolosky, W.J.1
Douceur, J.R.2
Ely, D.3
Theimer, M.4
-
7
-
-
77953066525
-
Choosing reputable servents in a P2P network
-
ACM Press
-
Fabrizio Cornelli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Choosing reputable servents in a P2P network. In Proceedings of the eleventh international conference on World Wide Web, pages 376-386. ACM Press, 2002.
-
(2002)
Proceedings of the Eleventh International Conference on World Wide Web
, pp. 376-386
-
-
Cornelli, F.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Paraboschi, S.4
Samarati, P.5
-
8
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
ACM Press
-
Ernesto Damiani, De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, and Fabio Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 207-216. ACM Press, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 207-216
-
-
Damiani, E.1
De Capitani Di Vimercati2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
11
-
-
0002101577
-
Reputation systems
-
Paul Resnick, Ko Kuwabara, Richard Zeckhauser, and Eric Friedman. Reputation systems. Communications of ACM, 43(12):45-48, 2000.
-
(2000)
Communications of ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
12
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
15
-
-
0037669985
-
Protecting privacy during on-line trust negotiation
-
April
-
Kent E. Seamons, Marianne Winslett, Ting Yu, L. Yu, and R. Jarvis. Protecting privacy during on-line trust negotiation. In Proceeding of the 2nd Workshop on Privacy Enhancing Technologies, April 2002.
-
(2002)
Proceeding of the 2nd Workshop on Privacy Enhancing Technologies
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Yu, L.4
Jarvis, R.5
-
18
-
-
84939548725
-
Automated trust negotiation
-
IEEE Press, January
-
William H. Winsborough, Kent E. Seamons, and Vicki E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, Volume 1, pages 88-102. IEEE Press, January 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
22
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
IEEE Computer Society
-
Ting Yu and Marianne Winslett. A unified scheme for resource protection in automated trust negotiation. In Proceedings of IEEE Symposium on Security and Privacy, pages 110-122. IEEE Computer Society, 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
23
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information System Security, 6(1):1-42, 2003.
-
(2003)
ACM Transactions on Information System Security
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|