Sciweavers

8243 search results - page 89 / 1649
» Can We Manage Trust
Sort
View
SAINT
2009
IEEE
14 years 3 months ago
Davis Social Links: Leveraging Social Networks for Future Internet Communication
In this paper, we present a social network based network communication architecture, Davis Social Links (DSL). DSL uses the trust and relationships inherent to human social networ...
Lerone Banks, Prantik Bhattacharyya, Matthew Spear...
ACMSE
2004
ACM
14 years 2 months ago
Trustworthiness in e-commerce
Usability has often been sold as the silver bullet for solving the problems of unprofitable online stores. Although better usability will generally improve these sites and their p...
Patricia Lanford, Roland Hübscher
ICMB
2006
IEEE
206views Business» more  ICMB 2006»
14 years 3 months ago
E-Pass Using DRM in Symbian v8 OS and TrustZone : Securing Vital Data on Mobile Devices
The mobile phone industry has established a large customer base market, providing a wide range of mobile applications from voice and data services to digital media such as digital...
Wan Huzaini Wan Hussin, Reuben Edwards, Paul Coult...
NOMS
2006
IEEE
14 years 3 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath
ECSA
2008
Springer
13 years 10 months ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...