Sciweavers

57 search results - page 8 / 12
» Relative Trustworthiness
Sort
View
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 1 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
WEBI
2009
Springer
14 years 1 months ago
Rigorous Probabilistic Trust-Inference with Applications to Clustering
The World Wide Web has transformed into an environment where users both produce and consume information. In order to judge the validity of information, it is important to know how...
Thomas DuBois, Jennifer Golbeck, Aravind Srinivasa...
SECURWARE
2008
IEEE
14 years 1 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...
HICSS
2007
IEEE
96views Biometrics» more  HICSS 2007»
14 years 1 months ago
Information Privacy and Trust in Government: a citizen-based perspective from New Zealand
Increasing use of e-government has raised issues about the privacy of information provided by citizens to government. This paper explores the experiences and concerns of New Zeala...
Rowena Cullen, Patrick Reilly
ITRUST
2005
Springer
14 years 15 days ago
Can We Manage Trust?
The term trust management suggests that trust can be managed, for example by creating trust, by assessing trustworthiness, or by determining optimal decisions based on specific le...
Audun Jøsang, Claudia Keser, Theodosis Dimi...