Sciweavers

1086 search results - page 18 / 218
» Management of trusted citations
Sort
View
IDTRUST
2010
ACM
14 years 4 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
IEEECIT
2010
IEEE
13 years 8 months ago
Incorporating Trust in Network Virtualization
In this paper, we propose a trust management framework for network virtualization environments. The proposed framework helps distinguish among the infrastructure providers based o...
Loubna Mekouar, Youssef Iraqi, Raouf Boutaba
IAT
2005
IEEE
14 years 3 months ago
Trust Model for Open Ubiquitous Agent Systems
Trust management model that we present is adapted for ubiquitous devices cooperation, rather than for classic client-supplier relationship. We use fuzzy numbers to represent trust...
Martin Rehák, Lukás Foltýn, M...
EEE
2004
IEEE
14 years 1 months ago
Spreading Activation Models for Trust Propagation
Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subj...
Cai-Nicolas Ziegler, Georg Lausen
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
14 years 7 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...