Filters








5,652 Hits in 11.5 sec

Why HTTPS Is Not Enough -- A Signature-Based Architecture for Trusted Content on the Social Web

Matthias Quasthoff, Harald Sack, Christoph Meinel
2007 IEEE/WIC/ACM International Conference on Web Intelligence (WI'07)  
We propose the deployment of XML Digital Signatures on web content and demonstrate how an architecture enabling for various security properties would look like.  ...  Easy to use, interactive web applications accumulating data from heterogeneous sources represent a recent trend on the World Wide Web, referred to as the Social Web.  ...  A signature-based architecture for trusted content on the Social Web As outlined in the previous section, our proposal focuses on integrity protection and authentication of text-based web content.  ... 
doi:10.1109/wi.2007.23 dblp:conf/webi/QuasthoffSM07 fatcat:hruzbsbjrra7ragmkx3bfpjgjq

Why HTTPS Is Not Enough -- A Signature-Based Architecture for Trusted Content on the Social Web

Matthias Quasthoff, Harald Sack, Christoph Meinel
2007 IEEE/WIC/ACM International Conference on Web Intelligence (WI'07)  
We propose the deployment of XML Digital Signatures on web content and demonstrate how an architecture enabling for various security properties would look like.  ...  Easy to use, interactive web applications accumulating data from heterogeneous sources represent a recent trend on the World Wide Web, referred to as the Social Web.  ...  A signature-based architecture for trusted content on the Social Web As outlined in the previous section, our proposal focuses on integrity protection and authentication of text-based web content.  ... 
doi:10.1109/wi.2007.4427196 fatcat:qli4zqqwx5d35pytwgbyqhphxy

infoDNA (Version 2) Agent Enhanced Trustworthy Distributed Information

Stephen Marsh
2004 Conference on Privacy, Security and Trust  
This paper introduces the infoDNA architecture, which seeks to address some of the intricacies involved in ascertaining the trustworthiness of information in a multi-person social networked setting.  ...  Using trust measures and digital signatures, a history of individual pieces of information can be built up to enable agents to better perform information handling tasks such as searching, sorting, and  ...  Signatures are available but ultimately anonymous, but we use a 'web of trust' to anonymously validate signatures in context for the current reader. 2.  ... 
dblp:conf/pst/Marsh04 fatcat:5m6ni5uurncc3nbq4umdntbgx4

Trust Management on the World Wide Web (originally published in June 1998)

Rohit Khare, Adam Rifkin
2006 First Monday  
Citizens The emergence of the Web as a social phenomenon will even affect people who do not use the Web.  ...  For example, consider the U.S. Social Security Administration's ill-fated attempt to put its records on the Web.  ... 
doi:10.5210/fm.v0i0.1589 fatcat:xcoc5f6aazgcnbhexyngd3x6fm

Semantic Insecurity: Security and the Semantic Web

Harry Halpin
2017 International Semantic Web Conference  
TLS is not in use currently for the majority of URIs on the Semantic Web, and this leads to a number of potential attacks on the network, web, and even semantic level.  ...  Strangely enough, the Semantic Web has fallen behind the rest of the Web in terms of security.  ...  Acknowledgments This work is funded in part by the European Commission H2020 European Commission through the NEXTLEAP Project (Grant No. 6882).  ... 
dblp:conf/semweb/Halpin17 fatcat:px35zugik5abjpbwhmvusoeqyq

Trust network-based filtering of aggregated claims

Jennifer Golbeck, Bijan Parsia
2006 International Journal of Metadata, Semantics and Ontologies  
By calculating a trust rating for each statement based on the ratings of its sources, the set of statements can be filtered based on the rating.  ...  This paper presents a method for using semantic web based trust networks to infer the reputation of sources for a statement and compose the reputation of several sources.  ...  First, a person believes that the trusted person will act in a certain way. The belief alone, however, is not enough to say there is trust.  ... 
doi:10.1504/ijmso.2006.008770 fatcat:swmd6sf3a5cjnkpoeiaz76rdsi

E-Learning and Semantic Web

Ahmed Rashad Khalifa
2015 International Journal of Intelligent Information Systems  
"Making content machine-understandable" is a popular paraphrase of the fundamental prerequisite for the Semantic Web.  ...  However, with the rapid increase of learning content on the Web, it is time-consuming for learners to find contents they really want to and need to study.  ...  The purpose of this paper is to clarify possibilities of using the Semantic Web as a backbone for E-Learning, which provides flexible and personalized access to these learning materials.  ... 
doi:10.11648/j.ijiis.20150405.11 fatcat:ipkzx52mmnbnlocfnf6a6zx3si

Enhancing web browsing security on public terminals using mobile composition

Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering
2008 Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08  
We present a security policy model for split-trust web applications that defends against a range of crimeware-based attacks, including those based on active-injection (e.g. inserting malicious packets  ...  This is achieved by enabling web applications to split their client-side pages across a pair of browsers: one untrusted browser running on a public PC and one trusted browser running on the user's personal  ...  The technical contribution of this paper is an architecture for split-trust web browsing through mobile composition: a technique that enables web applications to split their HTML across a pair of browsers-one  ... 
doi:10.1145/1378600.1378612 dblp:conf/mobisys/SharpMWP08 fatcat:7xekpra6vbawjdbfkcj3adckeq

Konfidi: Trust Networks Using PGP and RDF

David Brondsema, Andrew Schamp
2006 Workshop on Models of Trust for the Web  
Between yourself and some person X whom you do not know, Konfidi works to find a path of cryptographic PGP signatures to assure the identity of X, and estimates a trust rating by an algorithm that operates  ...  Trust networks have great potential for improving the effectiveness of email filtering and many other processes concerned with the validity of identity and content.  ...  If there is a short enough path of signatures from the recipient to the sender, the signature is considered "trusted".  ... 
dblp:conf/mtw/BrondsemaS06 fatcat:tk7556twdbdqbp7tsedldxn74u

Trust-based Ecosystem to Combat Fake News

Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan
2020 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)  
This paper attempts to resolve some of the aspects of this combat by presenting a high-level overview of TRUSTD, a blockchain and collective signature-based ecosystem to help content creators in getting  ...  The growing trend of sharing news/contents, through social media platforms and the World Wide Web has been seen to impact our perception of the truth, altering our views about politics, economics, relationships  ...  That is why some users prefer to trust a few sources of news/information.  ... 
doi:10.1109/icbc48266.2020.9169435 dblp:conf/icbc2/JarouchehAB20 fatcat:zdgynmeb3balpkoz75mfs4md2y

A Linked Data Based Messaging Architecture for the Web of Needs

Florian Kleedorfer, Christina Maria Busch, Christian Huemer, Christian Pichler
2015 Enterprise Modelling and Information Systems Architectures - An International Journal  
We argue that this structure is not necessary on the Web and that all online marketplaces could merge into one global medium for exchange.  ...  In this paper, we propose an architecture for such a medium based on semantic Web standards, encompassing the functionalities of publishing an intention to buy or sell, finding transaction partners, and  ...  While for our architecture, social networking is one of many possible applications, DSSN is specifically designed for it but can be combined with other semantic Web based systems to offer richer functionality  ... 
doi:10.18417/emisa.11.3 dblp:journals/emisaij/KleedorferBHP16 fatcat:rws5dvjhenfvfc4pqcg3zdcwdy

Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review

Jhon Francined Herrera-Cubides, Paulo Alonso Gaona-García, Carlos Enrique Montenegro-Marín, Diego Mauricio Cataño, Rubén González-Crespo
2022 International Journal of Communication Networks and Information Security  
Data, Social Network Data, etc.  ...  Within scientific community, there is a certain consensus to define "Big Data" as a global set, through a complex integration that embraces several dimensions from using of research data, Open Data, Linked  ...  In the same way, the subject matter is working as a line of Research Group GIIRA.  ... 
doi:10.17762/ijcnis.v11i3.4334 fatcat:cdsmfaqr6nca3njkvxawclsdua

Semantics and Non-Fungible Tokens for Copyright Management on the Metaverse and Beyond [article]

Roberto García, Ana Cediel, Mercè Teixidó, Rosa Gil
2022 arXiv   pre-print
Moreover, the semantic metadata is flexible enough to enable licensing not just in the real world.  ...  A token is used to curate these claims, and potential complaints, by staking it on them. Staking is incentivized by the fact that the token is minted using a bonding curve.  ...  Architecture Details The central part of CopyrightLY's architecture is on-chain and based on a set of smart contracts, as shown at the centre of Figure 2 .  ... 
arXiv:2208.14174v1 fatcat:3djmsq7lczaf3mzdgg2ocj5ilm

Webinos Project Deliverable: Phase 1 Security Framework

Webinos Consortium
2011 Zenodo  
The webinos project aims to deliver a cross-device web application runtime environment, providing a unified development platform and standardized inter-device communication and interaction.  ...  This document contains the first iteration of the technical security and privacy framework designed for the webinos project.  ...  Defining the Trusted Computing Base The Personal Zone Proxy on each device (or the Personal Zone Hub) is the trusted computing base.  ... 
doi:10.5281/zenodo.1154354 fatcat:ydjoaqcyvngfhpop3qyrbzp7r4

A survey on Information-centric Networking: Rationales, designs and debates

Xiaoke Jiang, Jun Bi, Guoshun Nan, Zhaogeng Li
2015 China Communications  
We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses.  ...  This work is supported by the National High-tech R&D Program ("863" Program)  ...  ACKNOWLEDGMENT Thanks to Lixia Zhang for many criticisms and discussions that helped clarify the technical descriptions of this paper.  ... 
doi:10.1109/cc.2015.7188520 fatcat:zp27olp33bdwzfue2eq4bmia7m
« Previous Showing results 1 — 15 out of 5,652 results