With the rapid development of E-commerce, more and more people are used to shopping online, in which the reputation scores of sellers play an important role in helping consumers …
Y Zeng, L Wang, X Deng, X Cao, N Khundker - Computers in industry, 2012 - Elsevier
Increasing global competition has led to massive outsourcing of manufacturing businesses. Such outsourcing practices require effective collaborations between focal manufacturers …
M Li, S Yu, N Cao, W Lou - 2011 31st international conference …, 2011 - ieeexplore.ieee.org
In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information …
J Camenisch, E Van Herreweghen - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a …
D Artz, Y Gil - Journal of Web Semantics, 2007 - Elsevier
Trust is an integral component in many kinds of human interaction, allowing people to act under uncertainty and with the risk of negative consequences. For example, exchanging …
We introduce the RT framework, a family of role-based trust management languages for representing policies and credentials in distributed authorization. RT combines the strengths …
Securing communication in network applications involves many complex tasks that can be daunting even for security experts. The Named Data Networking (NDN) architecture builds …
We address the problem of authorization in large-scale, open, distributed systems. Authorization decisions are needed in electronic commerce, mobile-code execution, remote …