Sciweavers

57 search results - page 6 / 12
» Relative Trustworthiness
Sort
View
ACISP
2000
Springer
13 years 11 months ago
PKI Seeks a Trusting Relationship
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
Audun Jøsang, Ingar Glenn Pedersen, Dean Po...
SIGIR
1998
ACM
13 years 11 months ago
How Reliable Are the Results of Large-Scale Information Retrieval Experiments?
Two stages in measurement of techniques for information retrieval are gathering of documents for relevance assessment and use of the assessments to numerically evaluate effective...
Justin Zobel
DSOM
2006
Springer
13 years 10 months ago
Conflict Prevention Via Model-Driven Policy Refinement
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algori...
Steven Davy, Brendan Jennings, John Strassner
AP2PC
2005
Springer
13 years 9 months ago
A Trust Management Scheme in Structured P2P Systems
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
NORDICHI
2006
ACM
14 years 29 days ago
How ordinary internet users can have a chance to influence privacy policies
By ‘Obligation Management’ we refer to the definition, automated enforcement, and monitoring of privacy obligation policies. Privacy policies are nowadays found on most organi...
John Sören Pettersson, Simone Fischer-Hü...