Sciweavers

2821 search results - page 105 / 565
» To Trust or Not to Trust
Sort
View
ICON
2007
IEEE
14 years 3 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...
OSDI
2000
ACM
13 years 10 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro
WWW
2011
ACM
13 years 3 months ago
Finding the bias and prestige of nodes in networks based on trust scores
Many real-life graphs such as social networks and peer-topeer networks capture the relationships among the nodes by using trust scores to label the edges. Important usage of such ...
Abhinav Mishra, Arnab Bhattacharya
ISPA
2005
Springer
14 years 2 months ago
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Abstract. Reputation systems help peers decide whom to trust before undertaking a transaction. Conventional approaches to reputation-based trust modeling assume that peers reputed ...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
ISEC
2001
Springer
126views ECommerce» more  ISEC 2001»
14 years 1 months ago
Building Trust for E-Commerce: Collaborating Label Bureaus
A major problem facing the full deployment of business-to-consumer (B2C) e-commerce is the development of trust on the side of the consumer. People develop trust in a business thr...
Michael A. Shepherd, Anil Dhonde, Carolyn R. Watte...