Interest for computational trust and reputation models is on the rise. One of the most important aspects of these models is how they deal with information received from other indi...
The online trust discussion is focused on mechanisms for building and maintaining user trust. This paper introduces the relevance of providing for the repair of trust breakdowns. ...
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...