Sciweavers

31 search results - page 6 / 7
» A Trust Model for Ubiquitous Systems based on Vectors of Tru...
Sort
View
CIARP
2003
Springer
14 years 1 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
HICSS
2008
IEEE
124views Biometrics» more  HICSS 2008»
14 years 2 months ago
Measuring Factors that Influence the Success of E-Government Initiatives
Understanding how citizens value e-government services is critical to the success of these initiatives. This paper describes the development of a model to identify factors that in...
Ronnie Park
CCS
2005
ACM
14 years 1 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
P2P
2006
IEEE
153views Communications» more  P2P 2006»
14 years 1 months ago
A Reciprocation-Based Economy for Multiple Services in Peer-to-Peer Grids
Peer-to-peer grids aim to build computational grids encompassing thousands of sites. To achieve this scale, such systems cannot rely on trust or off-line negotiations among partic...
Miranda Mowbray, Francisco Vilar Brasileiro, Nazar...
VMCAI
2004
Springer
14 years 1 months ago
Construction of a Semantic Model for a Typed Assembly Language
Typed Assembly Languages (TALs) can be used to validate the safety of assembly-language programs. However, typing rules are usually trusted as axioms. In this paper, we show how to...
Gang Tan, Andrew W. Appel, Kedar N. Swadi, Dinghao...