Sciweavers

8243 search results - page 109 / 1649
» Can We Manage Trust
Sort
View
ICMB
2005
IEEE
101views Business» more  ICMB 2005»
14 years 2 months ago
Mobile Ticketing System Employing TrustZone Technology
Security in mobile commerce is becoming more important due to increasing demand from users wishing to perform online transactions over mobile devices. Security is one of the criti...
Wan Huzaini Wan Hussin, Paul Coulton, Reuben Edwar...
SE
2008
13 years 10 months ago
Eliminating Trust From Application Programs By Way Of Software Architecture
: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Michael Franz
ENTCS
2006
103views more  ENTCS 2006»
13 years 9 months ago
A WOWA-based Aggregation Technique on Trust Values Connected to Metadata
Metadata produced by members of a diverse community of peers tend to contain low-quality or even mutually inconsistent assertions. Trust values computed on the basis of users'...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
IMCSIT
2010
13 years 7 months ago
Trusted Data in IBM's MDM: Accuracy Dimension
A good data model designed for e-Commerce or e-Government has little value if it lacks accurate, up-to-date data [22]. In this paper data quality measures, its processing and maint...
Przemyslaw Pawluk
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
14 years 2 months ago
A reputation-based trust model for peer-to-peer ecommerce communities
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...
Li Xiong, Ling Liu