Sciweavers

109 search results - page 8 / 22
» A personalized framework for trust assessment
Sort
View
TKDE
2010
135views more  TKDE 2010»
13 years 6 months ago
A Rule-Based Trust Negotiation System
—Open distributed environments such as the World Wide Web facilitate information sharing but provide limited support to the protection of sensitive information and resources. Tru...
Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedil...
EJIS
2007
150views more  EJIS 2007»
13 years 7 months ago
e-Government information systems: Evaluation-led design for public value and client trust
e-Government systems differ from commercial information systems (IS) in that they frequently encompass strategic goals that go beyond efficiency, effectiveness and economy, and in...
Michael Grimsley, Anthony Meehan
ACSAC
2007
IEEE
14 years 1 months ago
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting
Special purpose trusted computing devices are currently being deployed to offer many services for which the general purpose computing paradigm is unsuitable. The nature of the ser...
Aggelos Kiayias, Laurent Michel, Alexander Russell...
WOA
2004
13 years 9 months ago
Customer information sharing between e-commerce applications
The management of one-to-one business interaction is challenged by the latency in the acquisition of information about the individual customer's preferences. Although sharing ...
Barbara Negro, Angelo Difino, Fabio Bellifemine, G...
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
14 years 5 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...