The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Even though trust plays a significant role during decision-making in open collaborative environments, still end-user trust mechanisms have not be deployed in the EGEE grid computing setting. In this paper, we conduct a preliminary investigation on the integration of the trust paradigm in that environment, with a special focus on achieving end-user trust in an intuitive and practical manner.
The workshop is a small, high quality and interactive meeting for novel P2P ideas and proposals. On the one hand, collaborative P2P systems aim to benefit from the huge amount of unused resources of desktop computers (content, data storage, cpu, bandwidth) to create the next generation of Internet Infrastructures. On the other hand, P2P is particularly challenging for developing collaborative information...
Trust management, with trust collecting mechanism as one of its foundations, has been the focus of more and more researches in grid security. This paper analyzes shortages of existing trust collecting mechanisms, and then proposes a novel trust collecting mechanism by introducing the idea of publish/subscribe scheme used in messaging system. The objective of this mechanism is to support dynamic trust...
The three-tier architecture pattern and its variants have been around for a while and there are several discussions of their properties as well as several patterns. None of these discussions considers security. However, several real systems implement this approach including security. We revisit this pattern to explicitly separate and analyze its security aspects.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.