Sciweavers

8655 search results - page 24 / 1731
» Challenges for Trusted Computing
Sort
View
CASCON
2006
85views Education» more  CASCON 2006»
13 years 9 months ago
Trust by design: information requirements for appropriate trust in automation
Trust has, since the early stages of IBM's Autonomic Computing (AC) initiative, been recognized as an important factor in the success of new autonomic features. If operators ...
Pierre P. Duez, Michael Zuliani, Greg A. Jamieson
ICDCS
2009
IEEE
14 years 4 months ago
CAP: A Context-Aware Privacy Protection System for Location-Based Services
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses ...
Aniket Pingley, Wei Yu, Nan Zhang 0004, Xinwen Fu,...
PERCOM
2006
ACM
14 years 7 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
CSE
2009
IEEE
14 years 2 months ago
Tuning Evidence-Based Trust Models
Abstract—Many evidence-based trust models require the adjustment of parameters such as aging- or exploration-factors. What the literature often does not address is the systematic...
Eugen Staab, Thomas Engel
CHI
1998
ACM
13 years 11 months ago
Trust Breaks Down in Electronic Contexts But Can Be Repaired by Some Initial Face-to-Face Contact
Trust is the prerequisitefor successwhen a collaborative taskinvolves risk of individualistic or deceitfulbehaviorsof others. Cantrust emergein electroniccontexts? This issue is e...
Elena Rocco