Sciweavers

2821 search results - page 81 / 565
» To Trust or Not to Trust
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 8 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
IJMMS
2006
94views more  IJMMS 2006»
13 years 8 months ago
A framework for understanding trust factors in web-based health advice
Trust is a key factor in consumer decisions about website engagement. Consumers will engage with sites they deem trustworthy and turn away from those they mistrust. In this paper ...
Elizabeth Sillence, Pamela Briggs, Peter Harris, L...
IMCSIT
2010
13 years 6 months ago
Selected Security Aspects of Agent-based Computing
The paper presents selected security aspects related to confidentiality, privacy, trust and authenticity issues of a distributed, agent-based computing. Particular attention has be...
Mariusz R. Matuszek, Piotr Szpryngier
IJCAI
2007
13 years 10 months ago
Extracting and Visualizing Trust Relationships from Online Auction Feedback Comments
Buyers and sellers in online auctions are faced with the task of deciding who to entrust their business to based on a very limited amount of information. Current trust ratings on ...
John O'Donovan, Barry Smyth, Vesile Evrim, Dennis ...
COLCOM
2007
IEEE
14 years 3 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...