Sciweavers

2821 search results - page 98 / 565
» To Trust or Not to Trust
Sort
View
PODC
2003
ACM
14 years 2 months ago
Cryptography and competition policy: issues with 'trusted computing'
The most significant strategic development in information technology over the past year has been ‘trusted computing’. This is popularly associated with Microsoft’s ‘Pallad...
Ross J. Anderson
BDIM
2008
IEEE
119views Business» more  BDIM 2008»
13 years 10 months ago
On integrating trust into business-driven management of web services and their compositions
This paper discusses why trust is an essential aspect for business-driven IT management, as well as how it impacts management of web services and their compositions. We summarize t...
Chern Har Yew, Vladimir Tosic, Hanan Lutfiyya
ICIS
2000
13 years 10 months ago
Trust in e-commerce vendors: a two-stage model
This study investigates the development of trust in a Web-based vendor during two stages of a consumer's Web experience: exploration and commitment. Through an experimental d...
D. Harrison McKnight, Vivek Choudhury, Charles J. ...
TOIT
2008
92views more  TOIT 2008»
13 years 8 months ago
Security and identification indicators for browsers against spoofing and phishing attacks
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages...
Amir Herzberg, Ahmad Jbara
WOA
2004
13 years 10 months ago
Customer information sharing between e-commerce applications
The management of one-to-one business interaction is challenged by the latency in the acquisition of information about the individual customer's preferences. Although sharing ...
Barbara Negro, Angelo Difino, Fabio Bellifemine, G...