Filters








35,561 Hits in 6.0 sec

Viewing the Web as a Distributed Knowledge Base

Serge Abiteboul, Émilien Antoine, Julia Stoyanovich
2012 2012 IEEE 28th International Conference on Data Engineering  
For this, we use Webdamlog, a Datalogstyle language with rule delegation.  ...  We outline ongoing efforts on the WebdamExchange platform that combines Webdamlog evaluation with communication and security protocols.  ...  To summarize, the communication and security policies defined by the Manager, Communication and Security modules allow us to communicate with a variety of peers.  ... 
doi:10.1109/icde.2012.150 dblp:conf/icde/AbiteboulAS12 fatcat:jekz3c3g5jelhluczrgwcazt7i

Ad hoc grid security infrastructure

K. Amin, G. von Laszewski, M. Sosonkin, A.R. Mikler, M. Hategan
2005 The 6th IEEE/ACM International Workshop on Grid Computing, 2005.  
It adopts established community standards, with modifications where needed. This paper also discusses the integration of the ad hoc Grid security infrastructure in an ad hoc Grid implementation.  ...  It focuses on identity management, identity verification, and authorization control in spontaneous Grid collaborations without pre-established policies or environments.  ...  In the absence of a pre-established trust relationship, it is impractical and insecure for any peer to delegate a subset of its credentials to any other peer in the ad hoc Grid.  ... 
doi:10.1109/grid.2005.1542726 dblp:conf/grid/AminLSMH05 fatcat:p2k7d2yzozhcxhf3qfvhhmbko4

Trustworthy Agent-Based Recommender System in a Mobile P2P Environment [chapter]

Nabil Sahli, Gabriele Lenzini, Henk Eertink
2012 Lecture Notes in Computer Science  
In this paper, we aim at building a mobile P2P recommender system which dramatically reduces wireless traffic between peers, brings trustworthiness (each peer can choose to rely on opinions of peers whom  ...  he trusts), and ffers unobtrusiveness (the target system is mainly autonomous and requires a minimum user intervention).  ...  is not built upon the opinions of the whole community but rather of a group of selected peers, and (iii) peers' preferences and profiles are taken into account.  ... 
doi:10.1007/978-3-642-31809-2_6 fatcat:5xeoui3l7bcdhfnlrkjsjuhe4a

A Logical Approach to Cloud Federation [article]

Qiang Cao, Yuanjun Yao, Jeff Chase
2017 arXiv   pre-print
The foundation of our approach is a trust logic in which participants issue authenticated statements about principals, objects, attributes, and relationships in a logic language, with reasoning based on  ...  We show how to use the logic to implement a trust infrastructure for cloud federation that extends the model of NSF GENI, a federated IaaS testbed.  ...  Conclusion SAFE is a trust management system that uses a trust logic to represent policies, endorsements, and delegations.  ... 
arXiv:1708.03389v1 fatcat:36k7oqne3vbc5nhzekzh4fntwm

Distributed Privilege Enforcement in PACS [chapter]

Christoph Sturm, Ela Hunt, Marc H. Scholl
2009 Lecture Notes in Computer Science  
PACS enforces powerful access control models like RBAC with administrative delegation inside a P2P network in a pure P2P manner, which is not possible in any of the currently used P2P access control mechanisms  ...  Our analysis of the expected number of messages and the computational effort needed in PACS shows that its increased flexibility comes with an acceptable additional overhead.  ...  Their solution is also the problem, as a trusted reference monitor on the client is mandatory. The third option is to transfer enforcement to a group of peers, called delegates in the following.  ... 
doi:10.1007/978-3-642-03007-9_10 fatcat:wqflph2gu5ebfchvcsp6rllxuq

Rule-Based Application Development using Webdamlog [article]

Serge Abiteboul, Gerome Miklau (LSV, UMASS), Julia Stoyanovich, Jules Testard
2013 arXiv   pre-print
We present the WebdamLog system for managing distributed data on the Web in a peer-to-peer manner.  ...  We show how WebdamLog handles heterogeneity of the devices and services used to share data in such a Web setting.  ...  Also, by delegating such services to systems like Facebook, a user needs to trust more and more of his information to one particular system.  ... 
arXiv:1305.3058v1 fatcat:5bmv4d2q7featksk5xhr67f6ie

dDelega

Michele Tomaiuolo
2013 International Journal of Information Security and Privacy  
In fact, it is based on the peer-to-peer delegation of access rights among users, also across organizational boundaries, without supposing a-priori the existence of trusted third parties in the system.  ...  A decentralized approach to access control, which can be applied to such open environments, is represented by Trust Management.  ...  A possible approach to access control in an open environment is based on decentralized Trust Management (TM), i.e., on the peer-to-peer delegation of access rights among users.  ... 
doi:10.4018/jisp.2013070104 fatcat:wfpewo63xbdhnnjkvicmika7xu

Peer-to-Peer Delegation for Accessing Web Services

Michele Tomaiuolo, Paola Turci
2010 Workshop From Objects to Agents  
process with the agents associated to one or more Web services and responsible for the interaction with them.  ...  However, such delegations cannot come into effect unless they are associated with a corresponding delegation of privileges, which are needed to access some resources and achieve desired goals.  ...  Instead they are provided with means to manage the trust relations they build with other entities operating in the same, global environment.  ... 
dblp:conf/woa/TomaiuoloT10 fatcat:cgtwujzuqjhjbaagpmfor3ppre

On Trust Management in Grids

Alvaro Arenas, Michael Wilson, Brian Matthews
2007 Proceedings of the 1st International ICST Conference on Autonomic Computing and Communication Systems  
This paper presents an overview of the different concepts and technologies for managing trust in Grids.  ...  It examines the relation between trust and security, introducing the current technology for managing trust. The classical Virtual Organisation lifecycle is augmented with trust management actions.  ...  The resource owner thus partially delegates the allocation of authorisation rights to the community.  ... 
doi:10.4108/icst.autonomics2007.2230 dblp:conf/autonomics/ArenasWM07 fatcat:i6wfydsl2zbxdfojhsnujopipm

Rule-based application development using Webdamlog

Serge Abiteboul, Émilien Antoine, Gerome Miklau, Julia Stoyanovich, Jules Testard
2013 Proceedings of the 2013 international conference on Management of data - SIGMOD '13  
We present the WebdamLog system for managing distributed data on the Web in a peer-to-peer manner.  ...  We show how WebdamLog handles heterogeneity of the devices and services used to share data in such a Web setting.  ...  Also, by delegating such services to systems like Facebook, a user needs to trust more and more of his information to one particular system.  ... 
doi:10.1145/2463676.2465251 dblp:conf/sigmod/AbiteboulAMST13 fatcat:njgyjrxl2nfuzo5gkoyb7wgjae

An Effective Way of Evaluating Trust in Inter-cloud Computing

Kiran Mary Matthew, Abdul Quadir Md
2017 International Journal of Computer Network and Information Security  
For any communication to be successful, trust is necessary. For inter-cloud communication, clouds interact with each other for resource sharing.  ...  There is no way to ensure whether these peers are genuine in their opinion or not.  ...  These interactions can be used to have a good idea of whether to enter in to communication with it or not.  ... 
doi:10.5815/ijcnis.2017.02.05 fatcat:shjkv3w5gjfwbdcm2jro5djopi

Trust Coordination for Research Collaboration in the EOSC era

David L. Groep, Jens Jensen, David Kelsey, Daniel Kouril, Maarten Kremers, Hannah Short
2020 Zenodo  
settlement, but specifically also in managing the attributes of trust: integrity, resilience, availability, and trust in the composition of services and their use.  ...  Trust management is enabled by establishing and maintaining essential capabilities providing the appropriate level of integrity, resilience, availability, and confidentiality of the involved services and  ...  This means gaining the ability to effectively communicate on trust and integrity issues; augment the maturity level of service providers in terms of trust management, resilience, incident remediation,  ... 
doi:10.5281/zenodo.3674676 fatcat:4lstegvmanf5jjz2ez56dtztou

SHARP

Yun Fu, Jeffrey Chase, Brent Chun, Stephen Schwab, Amin Vahdat
2003 Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03  
These mechanisms enable flexible resource peering: sites may trade their resources with peering partners or contribute them to a federation according to local policies.  ...  subdivide and delegate claims across a network of resource managers.  ...  David Becker assisted us with experiments and data processing. Adriana Iamnitchi, Jim Horning, Justin Moore, and John Wilkes provided valuable comments on earlier drafts of this paper.  ... 
doi:10.1145/945445.945459 dblp:conf/sosp/FuCCSV03 fatcat:s75xpm35qvao5ks3jajx733rmy

SHARP

Yun Fu, Jeffrey Chase, Brent Chun, Stephen Schwab, Amin Vahdat
2003 ACM SIGOPS Operating Systems Review  
These mechanisms enable flexible resource peering: sites may trade their resources with peering partners or contribute them to a federation according to local policies.  ...  subdivide and delegate claims across a network of resource managers.  ...  David Becker assisted us with experiments and data processing. Adriana Iamnitchi, Jim Horning, Justin Moore, and John Wilkes provided valuable comments on earlier drafts of this paper.  ... 
doi:10.1145/1165389.945459 fatcat:dbxqnyferbhvrlm2sx3bz4dxeq

Model for Trust Among Peers in Electronic Multiparty Transactions

Sanjay Goel, Jagdish Gangolly
2003 Americas Conference on Information Systems  
We address the issue of trust among the principals in a multiparty transaction in a peer-to-peer system implementing a service-based architecture.  ...  For this phase a transitive trust model is used wherein trust among distant peers is established with each other using a chain of intermediaries via mutual acquaintances.  ...  In the first phase, the parties are passionate and peers are selected to form a federation based on the trust among the entities.  ... 
dblp:conf/amcis/GoelG03 fatcat:wxzedijdqjcadjybh5iigiubhy
« Previous Showing results 1 — 15 out of 35,561 results