Sciweavers

1022 search results - page 8 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
DSN
2009
IEEE
14 years 2 months ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...
EGOV
2007
Springer
14 years 1 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...
SAC
2010
ACM
14 years 2 months ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
WER
2004
Springer
14 years 29 days ago
Evaluating Methodologies: A Requirements Engineering Approach Through the Use of an Exemplar
Systems development methodologies continue to be a central area of research in software engineering. As the nature of applications and systems usage move increasingly towards open ...
Luiz Marcio Cysneiros, Vera Werneck, Eric S. K. Yu
IFIP
2009
Springer
14 years 2 months ago
HMM-Based Trust Model
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either a...
Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielse...