Systematizing decentralization and privacy: Lessons from 15 years of research and deployments

C Troncoso, M Isaakidis, G Danezis… - arXiv preprint arXiv …, 2017 - arxiv.org
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …

Blockchain-based decentralized reputation system in E-commerce environment

Z Zhou, M Wang, CN Yang, Z Fu, X Sun… - Future Generation …, 2021 - Elsevier
With the rapid development of E-commerce, more and more people are used to shopping
online, in which the reputation scores of sellers play an important role in helping consumers …

Secure collaboration in global design and supply chain environment: Problem analysis and literature review

Y Zeng, L Wang, X Deng, X Cao, N Khundker - Computers in industry, 2012 - Elsevier
Increasing global competition has led to massive outsourcing of manufacturing businesses.
Such outsourcing practices require effective collaborations between focal manufacturers …

Authorized private keyword search over encrypted data in cloud computing

M Li, S Yu, N Cao, W Lou - 2011 31st international conference …, 2011 - ieeexplore.ieee.org
In cloud computing, clients usually outsource their data to the cloud storage servers to
reduce the management costs. While those data may contain sensitive personal information …

Design and implementation of the idemix anonymous credential system

J Camenisch, E Van Herreweghen - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and
accountable transactions between users and service providers. As such, they represent a …

A survey of trust in computer science and the semantic web

D Artz, Y Gil - Journal of Web Semantics, 2007 - Elsevier
Trust is an integral component in many kinds of human interaction, allowing people to act
under uncertainty and with the risk of negative consequences. For example, exchanging …

Design of a role-based trust-management framework

N Li, JC Mitchell… - Proceedings 2002 IEEE …, 2002 - ieeexplore.ieee.org
We introduce the RT framework, a family of role-based trust management languages for
representing policies and credentials in distributed authorization. RT combines the strengths …

网构软件的研究与进展

吕建, 马晓星, 陶先平, 徐锋, 胡昊 - 中国科学: E 辑, 2006 - cqvip.com
随着Internet 的快速发展与普及, 如何在开放, 动态, 难控的网络环境下实现各类资源的共享和
集成已经成为计算机软件技术面临的重要挑战之一, 为了应对挑战, 许多新理念, 新概念, 新模型 …

Schematizing trust in named data networking

Y Yu, A Afanasyev, D Clark, KC Claffy… - proceedings of the 2nd …, 2015 - dl.acm.org
Securing communication in network applications involves many complex tasks that can be
daunting even for security experts. The Named Data Networking (NDN) architecture builds …

Delegation logic: A logic-based approach to distributed authorization

N Li, BN Grosof, J Feigenbaum - ACM Transactions on Information and …, 2003 - dl.acm.org
We address the problem of authorization in large-scale, open, distributed systems.
Authorization decisions are needed in electronic commerce, mobile-code execution, remote …