Sciweavers

730 search results - page 87 / 146
» Modeling trust in collaborative information systems
Sort
View
WWW
2008
ACM
14 years 10 months ago
Guanxi in the chinese web - a study of mutual linking
Guanxi is a type of dyadic social interaction based on feelings ("qing") and trust ("xin"). Long studied by scholars of Chinese origin, it has recently drawn t...
Valerie King, Louis Lei Yu, Yan Zhuang
CCS
2009
ACM
14 years 1 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 10 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
MOBILITY
2009
ACM
14 years 1 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
AAAI
2010
13 years 10 months ago
Collaborative Filtering Meets Mobile Recommendation: A User-Centered Approach
With the increasing popularity of location tracking services such as GPS, more and more mobile data are being accumulated. Based on such data, a potentially useful service is to m...
Vincent Wenchen Zheng, Bin Cao, Yu Zheng, Xing Xie...