Sciweavers

3299 search results - page 5 / 660
» Privacy and Trusted Computing
Sort
View
CACM
2005
64views more  CACM 2005»
13 years 8 months ago
Privacy and trust issues with invisible computers
Saadi Lahlou, Marc Langheinrich, Carsten Röck...
COMPSAC
2006
IEEE
14 years 2 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
ACSAC
2002
IEEE
14 years 1 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
AGENTS
2000
Springer
14 years 29 days ago
The Socio-cognitive Dynamics of Trust: Does Trust Create Trust?
We will examine in this paper three crucial aspects of trust dynamics: a) How A’s trusting B and relying on it in situation can actually (objectively) influence B’s trustworth...
Rino Falcone, Cristiano Castelfranchi
JTAER
2010
109views more  JTAER 2010»
13 years 7 months ago
A Flexible Architecture for Privacy-Aware Trust Management
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different pa...
Klemens Böhm, Sandro Etalle, Jerry den Hartog...