Sciweavers

2821 search results - page 41 / 565
» To Trust or Not to Trust
Sort
View
ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
14 years 3 months ago
Analyzing a human-based trust model for mobile ad hoc networks
— This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers t...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
IEEEARES
2008
IEEE
14 years 3 months ago
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
We present a secure e-commerce architecture that is resistant to client compromise and man-in-the-middle attacks on SSL. To this end, we propose several security protocols that us...
Frederic Stumpf, Claudia Eckert, Shane Balfe
ENTCS
2007
92views more  ENTCS 2007»
13 years 8 months ago
The MoR-Trust Distributed Trust Management System: Design and Simulation Results
MoR-Trust is a purely decentralized peer-to-peer trust management system, targeted towards networks and applications supporting transactions or collaborations of a quantitative na...
Stephanos Androutsellis-Theotokis, Diomidis Spinel...
ATC
2007
Springer
14 years 2 months ago
An Approach to a Trustworthy System Architecture Using Virtualization
We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group ...
Frederic Stumpf, Michael Benz, Martin Hermanowski,...
IAT
2009
IEEE
14 years 3 months ago
Incorporating Trust into Combinatorial Auctions: What Does Trust Cost?
As the use of automated negotiations becomes more mainstream, one key attribute that needs to be incorporated is a measure of a seller’s trust or reliability. In this paper, we ...
Guruprasad Airy, Po-Chun Chen, Tracy Mullen, John ...