Sciweavers

730 search results - page 26 / 146
» Modeling trust in collaborative information systems
Sort
View
OTM
2009
Springer
14 years 2 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
DESRIST
2010
Springer
169views Education» more  DESRIST 2010»
13 years 10 months ago
Designing for Light-Weight Collaboration: The Case of Interactive Citizens' Advisory Services
This paper reports on the design of a collaborative system to support citizens' advisory services. Recent research on the adoption of collaborative technologies indicates that...
Gerhard Schwabe, Claudia Bretscher, Birgit Schenk
DASC
2006
IEEE
14 years 2 months ago
DRBTS: Distributed Reputation-based Beacon Trust System
Abstract— Wireless Sensor Networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations where accurate location of sensors i...
Avinash Srinivasan, Joshua Teitelbaum, Jie Wu
ICWSM
2009
13 years 5 months ago
A Comparative Analysis of Trust-Enhanced Recommenders for Controversial Items
A particularly challenging task for recommender systems (RSs) is deciding whether to recommend an item that received a variety of high and low scores from its users. RSs that inco...
Patricia Victor, Chris Cornelis, Martine De Cock, ...
USS
2008
13 years 10 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller