Sciweavers

240 search results - page 14 / 48
» Context-Aware Trust Domains
Sort
View
WECWIS
2007
IEEE
95views ECommerce» more  WECWIS 2007»
14 years 1 months ago
Role-based Recommendation and Trust Evaluation
In general, in most trust evaluation systems, the evaluation of a target party under investigation relies on the trust ratings from responding peers/parties who have direct intera...
Yan Wang 0002, Vijay Varadharajan
COMPSAC
2006
IEEE
14 years 1 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
NBIS
2007
Springer
14 years 1 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
WISTP
2010
Springer
14 years 2 months ago
Trust in Peer-to-Peer Content Distribution Protocols
Abstract. The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to pee...
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
ESORICS
2003
Springer
14 years 22 days ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu