Sciweavers

89 search results - page 5 / 18
» Start Trusting Strangers
Sort
View
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 7 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa
EPIA
2009
Springer
14 years 2 months ago
Computing Confidence Values: Does Trust Dynamics Matter?
Computational Trust and Reputation (CTR) systems are platforms capable of collecting trust information about candidate partners and of computing confidence scores for each one of t...
Joana Urbano, Ana Paula Rocha, Eugénio C. O...
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
NDSS
2006
IEEE
14 years 1 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
CAISE
2004
Springer
14 years 27 days ago
Adding Trust to Ontology Based Peer-to-Peer Networks
This short paper starts with an overview of existing approaches of ontology based peer-to-peer solutions. It then focuses on trust issues within ontology based peer-to-peer network...
Axel Hahn, Sven Abels