publié le: October 2008
We construct two new multiparty digital signature schemes that allow multiple signers to sequentially and non-interactively produce a compact, fixed-...
In this article we develop a novel graph-based approach toward network forensics analysis. Central to our approach is the evidence graph model that f...
We introduce a general framework for reasoning about secrecy requirements in multiagent systems. Our definitions extend earlier definitions of secrec...
This article studies the notion of quantitative policies for trust management and gives protocols for realizing them in a disclosure-minimizing fashi...
publié le: December 2008
In trust negotiation and other forms of distributed proving, networked entities cooperate to form proofs of authorization that are justified by colle...