Sciweavers

8243 search results - page 43 / 1649
» Can We Manage Trust
Sort
View
CSSW
2007
13 years 9 months ago
Weaving Space into the Web of Trust: An Asymmetric Spatial Trust Model for Social Networks
The proliferation of Geo-Information (GI) production in web-based collaboration environments such as mapping mashups built on top of mapping APIs such as GoogleMaps API poses new c...
Mohamed Bishr
MSS
2005
IEEE
138views Hardware» more  MSS 2005»
14 years 1 months ago
Security vs Performance: Tradeoffs using a Trust Framework
We present an architecture of a trust framework that can be utilized to intelligently tradeoff between security and performance in a SAN file system. The primary idea is to diffe...
Aameek Singh, Sandeep Gopisetty, Linda Duyanovich,...
CCS
2006
ACM
13 years 11 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
MOBISYS
2007
ACM
14 years 7 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
ATAL
2006
Springer
13 years 11 months ago
Monopolizing markets by exploiting trust
We investigate trust-based relationships in electronic supply chains where trust is a measure of consistency in meeting negotiated contract deadlines. We consider scenarios where ...
Sandip Sen, Dipyaman Banerjee