Sciweavers

206 search results - page 24 / 42
» Managing Trust in a Peer-2-Peer Information System
Sort
View
SIGECOM
2004
ACM
127views ECommerce» more  SIGECOM 2004»
14 years 25 days ago
HYRIWYG: leveraging personalization to elicit honest recommendations
This paper presents HYRIWYG (How You Rate Influences What You Get), a reputation system applicable to Internet Recommendation Systems (RS). The novelty lies in the incentive mecha...
Ana Cristina Bicharra Garcia, Martin Ekstrom, Hans...
POLICY
2005
Springer
14 years 27 days ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
ICTAI
2009
IEEE
14 years 2 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 1 months ago
Connected Giving: Ordinary People Coordinating Disaster Relief on the Internet
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...