Sciweavers

446 search results - page 4 / 90
» Modeling trust in e-commerce: an approach based on user requ...
Sort
View
IV
2003
IEEE
118views Visualization» more  IV 2003»
14 years 23 days ago
Requirements of Deaf User of Information Visualization An Interdisciplinary Approach
In literature exist many links to translation of speech into sign language and links to gesturing with avatars. But the author cannot get any link to a visualization of background...
Dirk Burmeister
SAC
2010
ACM
14 years 2 months ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 8 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
WINET
2010
147views more  WINET 2010»
13 years 5 months ago
Hybrid trust and reputation management for sensor networks
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
Efthimia Aivaloglou, Stefanos Gritzalis
SPC
2005
Springer
14 years 29 days ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...