Sciweavers

8243 search results - page 97 / 1649
» Can We Manage Trust
Sort
View
WWW
2008
ACM
14 years 9 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
SIGMOD
2010
ACM
191views Database» more  SIGMOD 2010»
13 years 9 months ago
Data conflict resolution using trust mappings
In massively collaborative projects such as scientific or community databases, users often need to agree or disagree on the content of individual data items. On the other hand, tr...
Wolfgang Gatterbauer, Dan Suciu
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 28 days ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
TRUSTBUS
2004
Springer
14 years 2 months ago
Dynamically Changing Trust Structure in Capability Based Access Control Systems
The functioning of modern IT-systems with autonomously acting components requires an elaborate access control system in which each participant can maintain her own trust structure....
Sandra Wortmann, Barbara Sprick, Christoph Kobusch
ICWS
2007
IEEE
13 years 10 months ago
A Model to support SPKI Federations management through XKMS
The purpose of the XML Key Management Specification (XKMS) is to facilitate the use of a Public Key Infrastructure (PKI) by transferring the complexity associated with PKI to a t...
Michelle S. Wangham, Emerson Ribeiro de Mello, Jon...