CRYPTO '88 Proceedings on Advances in cryptology
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
NetCash: a design for practical electronic currency on the Internet
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Protection and Security Issues for Future Systems
Proceedings of the International Workshop on Operating Systems of the 90s and Beyond
On Inter-RealmAuthentication in Large Distributed Systems
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
Revokable and versatile electronic money (extended abstract)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
A Greedy Grid: The Grid Economic Engine Directive
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Security Issues in Mobile Code Systems
Mobile Agents and Security
Migration control for mobile agents based on passport and visa
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
Inter-enterprise contract architecture for open distributed systems: security requirements
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Grid resource management
Through different eyes: assessing multiple conceptual views for querying web services
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
Designing robust copy protection for software products
CompSysTech '08 Proceedings of the 9th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
Buying and selling with insurance in open multi-agent marketplace
PRICAI'06 Proceedings of the 9th Pacific Rim international conference on Artificial intelligence
Assessing web services quality for call-by-call outsourcing
WISEW'03 Proceedings of the Fourth international conference on Web information systems engineering workshops
Insurance services in multi-agent systems
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Security adoption in heterogeneous networks: the influence of cyber-insurance market
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part II
Security adoption and influence of cyber-insurance markets in heterogeneous networks
Performance Evaluation
Hi-index | 0.00 |
Clients in a distributed system place their confidence in many servers, and servers themselves rely on other servers for file storage, authentication, authorization, and payment. When a system spans administrative boundaries it becomes harder to assess the security and competence of potential service providers. This paper examines the issue of confidence in large distributed systems.When confidence is lacking in the “real world,” one relies on endorsements, licensing, insurance, and surety bonds to compensate. We show that by incorporating such assurances into a distributed system, users are better able to evaluate the risks incurred when using a particular server. This paper describes a method to electronically represent endorsements, licenses, and insurance policies, and discusses the means by which clients use such items when selecting service providers.