Sciweavers

1022 search results - page 10 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
IJAR
2007
104views more  IJAR 2007»
13 years 7 months ago
On representation and aggregation of social evaluations in computational trust and reputation models
Interest for computational trust and reputation models is on the rise. One of the most important aspects of these models is how they deal with information received from other indi...
Jordi Sabater-Mir, Mario Paolucci
CHI
2008
ACM
14 years 8 months ago
Recovering trust and avoiding escalation: an overlooked design goal of social systems
The online trust discussion is focused on mechanisms for building and maintaining user trust. This paper introduces the relevance of providing for the repair of trust breakdowns. ...
Asimina Vasalou, Jens Riegelsberger
ACSAC
2010
IEEE
13 years 5 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
ICEBE
2007
IEEE
158views Business» more  ICEBE 2007»
14 years 1 months ago
The Design of A Rule-based and Event-driven Trust Management Framework
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
JCDL
2006
ACM
133views Education» more  JCDL 2006»
14 years 1 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke