Sciweavers

2821 search results - page 28 / 565
» To Trust or Not to Trust
Sort
View
INTR
2007
100views more  INTR 2007»
13 years 7 months ago
Web services access control architecture incorporating trust
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of ...
Marijke Coetzee, Jan H. P. Eloff
WS
2004
ACM
14 years 29 days ago
Trust evaluation in ad-hoc networks
Title of Thesis: DISTRIBUTED TRUST EVALUATION IN AD-HOC NETWORKS Georgios E. Theodorakopoulos, Master of Science, 2004 Thesis directed by: Professor John S. Baras Department of El...
George Theodorakopoulos, John S. Baras
OTM
2005
Springer
14 years 1 months ago
Adding a Peer-to-Peer Trust Layer to Metadata Generators
In this paper we outline the architecture of a peer-to-peer Trust Layer that can be superimposed to metadata generators producing classifications, like our ClassBuilder and BTExac...
Paolo Ceravolo, Ernesto Damiani, Marco Viviani
ATAL
2006
Springer
13 years 11 months ago
Monopolizing markets by exploiting trust
We investigate trust-based relationships in electronic supply chains where trust is a measure of consistency in meeting negotiated contract deadlines. We consider scenarios where ...
Sandip Sen, Dipyaman Banerjee
IPPS
2003
IEEE
14 years 25 days ago
Trust Modeling for Peer-to-Peer Based Computing Systems
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. ...
Farag Azzedin, Muthucumaru Maheswaran