Sciweavers

754 search results - page 36 / 151
» Can self-managed systems be trusted
Sort
View
USENIX
2004
15 years 5 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
MABS
2007
Springer
15 years 10 months ago
Trust-Based Inter-temporal Decision Making: Emergence of Altruism in a Simulated Society
This paper contributes to the analysis of the question how altruistic behaviour can be in an agent’s own interest. The question is addressed by involving a temporal dimension in ...
Tibor Bosse, Martijn C. Schut, Jan Treur, David We...
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
15 years 10 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco
ECIS
2003
15 years 5 months ago
An empirical investigation of intelligent agents for e-business customer relationship management: a knowledge management perspec
: Using a knowledge management perspective, this paper investigates new and efficient ways of applying intelligent agents to e-business customer relationship management. Intelligen...
Weiquan Wang, Izak Benbasat
137
Voted
IJMMS
2008
60views more  IJMMS 2008»
15 years 4 months ago
In praise of forgiveness: Ways for repairing trust breakdowns in one-off online interactions
Online offences are generally considered as frequent and intentional acts performed by a member with the aim to deceive others. However, an offence may also be unintentional or ex...
Asimina Vasalou, Astrid Hopfensitz, Jeremy V. Pitt