Academic discourse on trust is fractured along disciplinary lines. Security theorists routinely use a definition of trust which, apparently, has little in common with any of the d...
Abstract. We define a basic calculus for name management, which is obtained by an appropriate combination of three ingredients: extensible records (in a simplified form), names (...
Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically disco...
Emerging ubiquitous computing leverages the need for automated trust management models. We take a domestic network of both fixed and mobile nodes as our reference scenario and in...
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...