一起 发表于 2025-3-23 10:41:07

http://reply.papertrans.cn/17/1668/166746/166746_11.png

keloid 发表于 2025-3-23 15:39:30

A Risk-Aware Resource Service Decision Strategy for Global Computingrmation before providing services for resource requesters. Although many trust management models have been proposed to deal with security concerned in resource service, few of them take risk into consideration. In those schemes involving risk, either risk is discussed conceptually, or methods for ca

GLOOM 发表于 2025-3-23 19:46:13

Message Race Detection for Web Services by an SMT-Based Analysised by four factors: security, privacy, reliability and business integrity. Web Services use message-passing for communication which opens the door for messages races. Messages race with each other when their order of arrival at a destination is not guaranteed and is affected non-deterministically by

cushion 发表于 2025-3-23 22:58:41

A User-Oriented Approach to Assessing Web Service Trustworthinesserception of users. However accurate assessment for service trustworthiness from user’s perception is a difficult problem, since user perception of a particular Web service varies in terms of users, application scenarios and time. In this paper, we present a user oriented Web service trustworthiness

Projection 发表于 2025-3-24 02:45:59

Improving the Trustworthiness of Service QoS Information in Service-Based Systems are composed of available services. Besides services’ capabilities, the qualities of services (QoS) also need to be considered in service composition in order to have high-quality workflows. The QoS profiles of services provided by their service providers may be inaccurate. In this paper, an approa

无意 发表于 2025-3-24 06:44:26

Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Softwaretware trustworthiness is presented. Software under evaluation is compared with some predefined norms and is assigned to one of trust levels. The entire evaluating process is described, including definition of problem situation and formulation, determination of the model and its parameters, and the a

diathermy 发表于 2025-3-24 13:29:08

http://reply.papertrans.cn/17/1668/166746/166746_17.png

JEER 发表于 2025-3-24 15:30:38

http://reply.papertrans.cn/17/1668/166746/166746_18.png

体贴 发表于 2025-3-24 19:36:32

Design and Analysis of “Flexible” ,-out-of-, Signaturesnstruction guarantees that a single signer can close at most one ring so the result of the combination is the required (.,.)-ring signature. This construction is useful in, for example, electronic negotiations or games where gradual revelation on how many people signed a given document is required.

小步走路 发表于 2025-3-25 00:49:52

0302-9743and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable c
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Autonomic and Trusted Computing; 7th International Co Bing Xie,Juergen Branke,Xingshe Zhou Conference proceedings 2010 The Editor(s) (if ap