Sciweavers

3299 search results - page 79 / 660
» Privacy and Trusted Computing
Sort
View
CHI
1998
ACM
14 years 25 days ago
Trust Breaks Down in Electronic Contexts But Can Be Repaired by Some Initial Face-to-Face Contact
Trust is the prerequisitefor successwhen a collaborative taskinvolves risk of individualistic or deceitfulbehaviorsof others. Cantrust emergein electroniccontexts? This issue is e...
Elena Rocco
CHI
2006
ACM
13 years 10 months ago
Privacy and HCI: methodologies for studying privacy issues
Sameer Patil, Natalia A. Romero, John Karat
CHI
2008
ACM
14 years 9 months ago
Recovering trust and avoiding escalation: an overlooked design goal of social systems
The online trust discussion is focused on mechanisms for building and maintaining user trust. This paper introduces the relevance of providing for the repair of trust breakdowns. ...
Asimina Vasalou, Jens Riegelsberger
WPES
2006
ACM
14 years 2 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
IWSAS
2001
Springer
14 years 1 months ago
Exercising Qualitative Control in Autonomous Adaptive Survivable Systems
We seek to construct autonomous adaptive survivable systems that use active trust management to adapt their own behavior in the face of compromises in the computational environment...
Jon Doyle, Michael McGeachie