Sciweavers

8243 search results - page 20 / 1649
» Can We Manage Trust
Sort
View
AUTONOMICS
2007
ACM
13 years 11 months ago
Featuring trust and reputation management systems for constrained hardware devices
Research on trust management systems for wireless sensor networks is still at a very early stage and few works have done so far. It seems that for those works which deal with the ...
Rodrigo Roman, M. Carmen Fernández Gago, Ja...
JTAER
2010
120views more  JTAER 2010»
13 years 6 months ago
Trust and Distrust in Adaptive Inter-enterprise Collaboration Management
The success and competitive edge of enterprises has become increasingly dependent on the enterprises’ agility to become members in business networks that support their own busin...
Sini Ruohomaa, Lea Kutvonen
ASPLOS
2008
ACM
13 years 9 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
GCC
2004
Springer
14 years 28 days ago
Integrating Trust in Grid Computing Systems
A Grid computing system is a virtual resource framework. Inside the framework, resources are being shared among autonomous domains which can be geographically distributed. One prim...
Woodas W. K. Lai, Kam-Wing Ng, Michael R. Lyu
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 2 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami