An Untrustworthy Observer

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Global Authentication in an Untrustworthy World

With the advent in the 1980’s of truly global hierarchical naming (via the Domain Name Service), security researchers realized that the trust relationships needed to authenticate principals would often not follow the naming hierarchy [1,13]. The most successful non-hierarchical authentication schemes are based on X.509 and RFC 5280, as used for example in TLS and Authenticode. These are extreme...

متن کامل

An Initial Investigation into Querying an Untrustworthy and Inconsistent Web

The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular, we replace the question of whether an assertion is entailed by the entire Semantic Web with two other queries. The first asks if a specific statement is entailed given an identification of the trusted documents. The...

متن کامل

Auctions with Untrustworthy Bidders

The paper analyzes auctions which are not completely enforceable. In such auctions, the winning bidders may fail to carry out their obligations, and parties involved cannot rely on external enforcement or control mechanisms for backing up a transaction. We propose two mechanisms that make bidders directly or indirectly reveal their trustworthiness. The first mechanism is based on discriminating...

متن کامل

Authentic Data Collection in an Untrustworthy Computer Environment

A central matter in e-commerce and e-government is digital contracting and signing. The processes to be supported are to ensure a trustable and provable sequence of acts between the parties concerned following legal rules in a fast and flexible manner. Complex infrastructures like PKIs have been established to cope this task. But still there is a big lack: creating signatures in an untrustworth...

متن کامل

Providing privacy to agents in an untrustworthy environment

Agent technology gives many promises for future IT-systems, but providing security and privacy in particular is a difficult challenge. This paper addresses the privacy problems in agent technology and provides several solutions to overcome some of these problems. It is shown that if an encryption algorithm is used in a different form it can also provide privacy in communication for agents. Seco...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Auk

سال: 1898

ISSN: 0004-8038,1938-4254

DOI: 10.2307/4068280