Sciweavers

3299 search results - page 26 / 660
» Privacy and Trusted Computing
Sort
View
CCS
2010
ACM
14 years 3 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
CCS
2000
ACM
14 years 8 days ago
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts...
Ting Yu, Xiaosong Ma, Marianne Winslett
SEMWEB
2007
Springer
14 years 2 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines
FOSAD
2007
Springer
14 years 2 months ago
Trust and Reputation Systems
Audun Jøsang
PET
2004
Springer
14 years 2 months ago
Privacy-Preserving Trust Negotiations
Elisa Bertino, Elena Ferrari, Anna Cinzia Squiccia...