Sciweavers

346 search results - page 21 / 70
» Can we trust docking results
Sort
View
DBSEC
2007
104views Database» more  DBSEC 2007»
13 years 9 months ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng
INFOCOM
2006
IEEE
14 years 1 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
COMCOM
2007
83views more  COMCOM 2007»
13 years 7 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
COLCOM
2007
IEEE
14 years 1 months ago
Modeling trust in collaborative information systems
—Collaborative systems available on the Web allow millions of users to share information through a growing collection of tools and platforms such as wikis, blogs and shared forum...
Sara Javanmardi, Cristina Videira Lopes
NCA
2005
IEEE
14 years 1 months ago
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications
In distributed P2P environments, peers (i.e., users) often have to request the services from some unfamiliar peers (i.e., resources) that could be altruistic, selfish, or even ma...
William Sears, Zhen Yu, Yong Guan