Sciweavers

730 search results - page 43 / 146
» Modeling trust in collaborative information systems
Sort
View
SAC
2002
ACM
13 years 8 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
CCS
1994
ACM
14 years 1 months ago
Support for the File System Security Requirements of Computational E-Mail Systems
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Trent Jaeger, Atul Prakash
MTA
2011
220views Hardware» more  MTA 2011»
13 years 4 months ago
Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration
: With the advances in a variety of software/hardware technologies and wireless networking, there is coming a need for ubiquitous collaboration which allows people to access inform...
Kangseok Kim, Geoffrey C. Fox
JUCS
2008
109views more  JUCS 2008»
13 years 9 months ago
Seamless Transition between Connected and Disconnected Collaborative Interaction
Abstract: Nowadays, more and more users make use of web-based collaborative systems. Users participate in communities or search for and provide information in webbased systems. The...
Stephan Lukosch
JUCS
2010
98views more  JUCS 2010»
13 years 7 months ago
Toward an Understanding of the Mediating Role of "Trust" in Mobile Banking Service: An Empirical Test of Indonesia Case
: Mobile banking has been considered to be one of the most value-added and important mobile services currently available. Considering the fact that the penetration of this technolo...
Chulmo Koo, Yulia Wati