In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
Interest for computational trust and reputation models is on the rise. One of the most important aspects of these models is how they deal with information received from other indi...
: Owing to the recent technical advances in the computing and mobile communications domain, the world of online virtual communities is experiencing a phenomenal growth and ever-inc...
Pravin Pawar, Julien Subercaze, Pierre Maret, Bert...
Within the last few years, knowledge management has become one of the hottest subjects among organisational and information systems theorists and practitioners. Many find in it an...
Social networking has provided powerful new ways to find people, organize groups, and share information. Recently, the potential functionalities of the ubiquitous infrastructure le...