Sciweavers

8243 search results - page 34 / 1649
» Can We Manage Trust
Sort
View
SRDS
2010
IEEE
13 years 5 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
SEC
2004
13 years 9 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
IFIPTM
2010
145views Management» more  IFIPTM 2010»
13 years 6 months ago
A Formal Notion of Trust - Enabling Reasoning about Security Properties
Historically, various different notions of trust can be found, each addressing particular aspects of ICT systems, e.g. trust in electronic commerce systems based on reputation and...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
COOPIS
2004
IEEE
13 years 11 months ago
Service Graphs for Building Trust
Information systems must establish trust to cooperate effectively in open environments. We are developing an agent-based approach for establishing trust, where information systems ...
Pinar Yolum, Munindar P. Singh
ACISP
2000
Springer
13 years 12 months ago
PKI Seeks a Trusting Relationship
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
Audun Jøsang, Ingar Glenn Pedersen, Dean Po...