Sciweavers

8243 search results - page 73 / 1649
» Can We Manage Trust
Sort
View
ACSC
2004
IEEE
13 years 11 months ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald
WEBI
2009
Springer
14 years 2 months ago
Rigorous Probabilistic Trust-Inference with Applications to Clustering
The World Wide Web has transformed into an environment where users both produce and consume information. In order to judge the validity of information, it is important to know how...
Thomas DuBois, Jennifer Golbeck, Aravind Srinivasa...
CIMCA
2006
IEEE
14 years 1 months ago
Assessing and Assuring Trust in E-Commerce Systems
On-line trading or Internet Commerce restoring to ECommerce systems are gradually replacing the traditional commerce activities. Internet users must have reasonable faith on the u...
Zhongwei Zhang, Zhen Wang
CIA
2008
Springer
13 years 9 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
SPW
2004
Springer
14 years 1 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone