Sciweavers

2821 search results - page 54 / 565
» To Trust or Not to Trust
Sort
View
SSS
2009
Springer
14 years 1 months ago
Optimistic Fair Exchange Using Trusted Devices
Efficiency of optimistic fair exchange using trusted devices is studied. Pfitzmann, Schunter and Waidner (PODC 1998) have shown that four messages in the main sub-protocol is op...
Mohammad Torabi Dashti
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 3 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 3 months ago
A guide to trust in mobile ad hoc networks
In this paper we examine issues of trust and reputation in Mobile Ad hoc Networks. We look at a number of the trust and reputation models that have been proposed and we highlight o...
Shane Balfe, Po-Wah Yau, Kenneth G. Paterson
BNCOD
2006
85views Database» more  BNCOD 2006»
13 years 10 months ago
Trust Obstacle Mitigation for Database Systems
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model...
Victor Page, Robin C. Laney, Maurice Dixon, Charle...
PUC
2000
122views more  PUC 2000»
13 years 8 months ago
Disseminating Trust Information in Wearable Communities
: This paper describes a framework for managing and distributing trust information in a community of mobile and wearable computer users. Trust information in the form of reputation...
Jay Schneider, Gerd Kortuem, Joe Jager, Stephen Fi...