Sciweavers

2821 search results - page 106 / 565
» To Trust or Not to Trust
Sort
View
IJNVO
2008
85views more  IJNVO 2008»
13 years 9 months ago
Analysing trust as a means of improving the effectiveness of the virtual supply chain
: This article focuses on trust within interorganisational virtual organisations, which are regarded as legally separate but operationally interdependent companies focused on respo...
Ian Paterson, Heather Maguire, Latif Al-Hakim
IJNSEC
2007
157views more  IJNSEC 2007»
13 years 8 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
TDSC
2011
13 years 3 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
CCS
2005
ACM
14 years 2 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
ATC
2007
Springer
14 years 3 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...