Sciweavers

8243 search results - page 133 / 1649
» Can We Manage Trust
Sort
View
DRM
2008
Springer
13 years 12 months ago
A four-layer model for security of digital rights management
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This co...
Eric Diehl
ATAL
2007
Springer
14 years 4 months ago
Managing the pedigree and quality of information in dynamic information sharing environments
The quality of information is crucial for decision making in many mission-critical applications such as battlefield operations and intelligence analysis. However, as the system b...
Bin Yu, Srikanth Kallurkar, Ganesh Vaidyanathan, D...
HICSS
2009
IEEE
179views Biometrics» more  HICSS 2009»
14 years 5 months ago
Understanding Continuance Intention of Knowledge Creation in Online Communities from a Social-Psychological Perspective
Grounded on both social cognitive theory and expectation-disconfirmation theory (EDT), this study aims to investigate how individuals’ continuance intention of knowledge creatio...
Shih-Wei Chou, Ching-Chang Lee, Yu-Chieh Chang, Ch...
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 5 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
WWW
2007
ACM
14 years 10 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...