Sciweavers

1086 search results - page 5 / 218
» Management of trusted citations
Sort
View
SIGSOFT
2004
ACM
14 years 3 months ago
Engineering human trust in mobile system collaborations
Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically disco...
Licia Capra
WOWMOM
2005
ACM
95views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
Incremental Trust: Building Trust from Past Experience
Emerging ubiquitous computing leverages the need for automated trust management models. We take a domestic network of both fixed and mobile nodes as our reference scenario and in...
Marco Domenico Aime, Antonio Lioy
IDTRUST
2009
ACM
14 years 4 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
ICEBE
2007
IEEE
158views Business» more  ICEBE 2007»
14 years 4 months ago
The Design of A Rule-based and Event-driven Trust Management Framework
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
COMSUR
2000
202views more  COMSUR 2000»
13 years 9 months ago
A Survey of Trust in Internet Applications
Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy i.e. who is authorised to perform action...
Tyrone Grandison, Morris Sloman