Sciweavers

8243 search results - page 98 / 1649
» Can We Manage Trust
Sort
View
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
14 years 3 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
CCS
2006
ACM
14 years 22 days ago
Daonity: grid security with behaviour conformity from trusted computing
A central security requirement for grid computing can be referred to as behaviour conformity. This is an assurance that ad hoc related principals (users, platforms or instruments)...
Wenbo Mao, Fei Yan, Chunrun Chen
AAI
2004
112views more  AAI 2004»
13 years 9 months ago
Devising A Trust Model For Multi-Agent Interactions Using Confidence And Reputation
In open environments in which autonomous agents can break contracts, computational models of trust have an important role to play in determining who to interact with and how inter...
Sarvapali D. Ramchurn, Nicholas R. Jennings, Carle...
AINA
2005
IEEE
14 years 2 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan
VLDB
2004
ACM
95views Database» more  VLDB 2004»
14 years 2 months ago
Combating Web Spam with TrustRank
Web spam pages use various techniques to achieve higher-than-deserved rankings in a search engine’s results. While human experts can identify spam, it is too expensive to manual...
Zoltán Gyöngyi, Hector Garcia-Molina, ...