Sciweavers

8243 search results - page 68 / 1649
» Can We Manage Trust
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 5 days ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
SEC
2008
13 years 9 months ago
Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Privat
Every time a user uses the Internet, a wealth of personal information is revealed, either voluntarily or involuntarily. This often causes privacy breaches, specially if the informa...
Indrajit Ray, Sudip Chakraborty
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 8 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
DSS
2007
104views more  DSS 2007»
13 years 7 months ago
Investigating interactions of trust and interest similarity
Online communities that allow their users to express their personal preferences, such as the members they trust and the products they appreciate, are becoming increasingly popular...
Cai-Nicolas Ziegler, Jennifer Golbeck