Sciweavers

266 search results - page 12 / 54
» Hierarchical Model of Trust in Contexts
Sort
View
SRDS
2003
IEEE
14 years 1 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
SPW
2000
Springer
14 years 4 days ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
SIGIR
2000
ACM
14 years 28 days ago
Hierarchical classification of Web content
This paper explores the use of hierarchical structure for classifying a large, heterogeneous collection of web content. The hierarchical structure is initially used to train diffe...
Susan T. Dumais, Hao Chen
SIGCPR
2006
ACM
346views Hardware» more  SIGCPR 2006»
14 years 2 months ago
An extension of the UTAUT model with e-quality, trust, and satisfaction constructs
This research seeks to validate a comprehensive model of quality in the context of e-business systems. It also extends the UTAUT model with e-quality, trust, and satisfaction cons...
Erin Cody-Allen, Rajiv Kishore
USS
2008
13 years 11 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller