Sciweavers

8243 search results - page 17 / 1649
» Can We Manage Trust
Sort
View
ISW
2007
Springer
14 years 1 months ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 2 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
SIGSOFT
2004
ACM
14 years 29 days ago
Engineering human trust in mobile system collaborations
Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically disco...
Licia Capra
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 1 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
KESAMSTA
2010
Springer
13 years 5 months ago
Trust Estimation Using Contextual Fitness
Trust estimation is an essential process in several multi-agent systems domains. Although it is generally accepted that trust is situational, the majority of the Computational Trus...
Joana Urbano, Ana Paula Rocha, Eugénio C. O...