Sciweavers

3299 search results - page 55 / 660
» Privacy and Trusted Computing
Sort
View
IAT
2010
IEEE
13 years 6 months ago
Trustworthiness Tendency Incremental Extraction Using Information Gain
Computational trust systems are getting popular in several domains such as social networks, grid computing and business-to-business systems. However, the estimation of the trustwo...
Joana Urbano, Ana Paula Rocha, Eugenio Oliveira
WPES
2004
ACM
14 years 2 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
CCS
2008
ACM
13 years 10 months ago
Improving the scalability of platform attestation
In the process of platform attestation, a Trusted Platform Module is a performance bottleneck, which causes enormous delays if multiple simultaneously attestation requests arrive ...
Frederic Stumpf, Andreas Fuchs, Stefan Katzenbeiss...
SAC
2006
ACM
14 years 2 months ago
BambooTrust: practical scalable trust management for global public computing
Global public computing platforms, such as PlanetLab, grid computing systems, and XenoServers, require facilities for managing trust to allow their participants to interact effect...
Evangelos Kotsovinos, Aled Williams
KESAMSTA
2010
Springer
13 years 6 months ago
Engaging the Dynamics of Trust in Computational Trust and Reputation Systems
Computational Trust and Reputation (CTR) systems are essential in electronic commerce to encourage interactions and suppress deceptive behaviours. This paper focus on comparing two...
Agnieszka Danek, Joana Urbano, Ana Paula Rocha, Eu...