-
1
-
-
0032066141
-
A secure active network environment architecture: Realization in switchware
-
ALEXANDER, D. S., ARBAUGH, W. A., KEROMYTIS, A. D., AND SMITH, J. M. A secure active network environment architecture: Realization in switchware. IEEE Network Magazine 12, 3 (1998).
-
(1998)
IEEE Network Magazine
, vol.12
, pp. 3
-
-
ALEXANDER, D.S.1
ARBAUGH, W.A.2
KEROMYTIS, A.D.3
SMITH, J.M.4
-
2
-
-
34250687130
-
A survey of trust in computer science and the semantic web
-
Submitted for publication
-
ARTZ, D., AND GIL, Y. A survey of trust in computer science and the semantic web. Submitted for publication (2006).
-
(2006)
-
-
ARTZ, D.1
GIL, Y.2
-
8
-
-
35048825114
-
Personalized reputation management in P2P networks
-
CHIRITA, A., NEJDL, W., SCHLOSSER, M., AND SCURTU, O. Personalized reputation management in P2P networks. In Proceedings of the Trust, Security, and Reputation Workshop held at the 3rd International Semantic Web Conference (2004).
-
(2004)
Proceedings of the Trust, Security, and Reputation Workshop held at the 3rd International Semantic Web Conference
-
-
CHIRITA, A.1
NEJDL, W.2
SCHLOSSER, M.3
SCURTU, O.4
-
9
-
-
0001843009
-
Referee: Trust management for web applications
-
CHU, Y., FEIGENBAUM, J., LAMACCHIA, B., RESNICK, P., AND STRAUSS, M. Referee: Trust management for web applications. World Wide Web Journal 2 (1997).
-
(1997)
World Wide Web Journal
, vol.2
-
-
CHU, Y.1
FEIGENBAUM, J.2
LAMACCHIA, B.3
RESNICK, P.4
STRAUSS, M.5
-
14
-
-
85131818719
-
Combating web spam with TrustRank
-
Tech. rep, Stanford, March
-
GYONGYI, Z., GARCIA-MOLINA, H., AND PEDERSEN, J. Combating web spam with TrustRank. Tech. rep., Stanford, March 2004.
-
(2004)
-
-
GYONGYI, Z.1
GARCIA-MOLINA, H.2
PEDERSEN, J.3
-
16
-
-
4243148480
-
Authoritative sources in a hyperlinked environment
-
September
-
KLEINBERG, J. M. Authoritative sources in a hyperlinked environment. Journal of the ACM 46, 5 (September 1999), 604-632.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 604-632
-
-
KLEINBERG, J.M.1
-
18
-
-
0003700417
-
Kerberos authentication and authorization system
-
Tech. rep, MIT, 1987
-
MILLER, S. P., NEUMAN, B. C., SCHILLER, J. I., AND SALTZER, J. H. Kerberos authentication and authorization system. Tech. rep., MIT, 1987.
-
-
-
MILLER, S.P.1
NEUMAN, B.C.2
SCHILLER, J.I.3
SALTZER, J.H.4
-
19
-
-
35048841281
-
Peertrust: Automated trust negotiation for peers on the semantic web
-
NEJDL, W., OLMEDILLA, D., AND WINSLETT, M. Peertrust: Automated trust negotiation for peers on the semantic web. In Proceedings of Secure Data Management 2004 (2004), pp. 118-132.
-
(2004)
Proceedings of Secure Data Management 2004
, pp. 118-132
-
-
NEJDL, W.1
OLMEDILLA, D.2
WINSLETT, M.3
-
20
-
-
0030258432
-
-
RESNICK, P., AND MILLER, J. ICS: Internet access controls without censorship. Communications of the ACM (October 1996).
-
RESNICK, P., AND MILLER, J. ICS: Internet access controls without censorship. Communications of the ACM (October 1996).
-
-
-
-
21
-
-
0003614529
-
SDSI: A simple distributed security infrastructure
-
Tech. rep, MIT, 1996
-
RIVEST, R. L., AND LAMPSON, B. SDSI: A simple distributed security infrastructure. Tech. rep., MIT, 1996. http://theory.les. mit.edu/~cis/sdsi.html.
-
-
-
RIVEST, R.L.1
LAMPSON, B.2
|