Sciweavers

1139 search results - page 121 / 228
» Trust Management Survey
Sort
View
HICSS
2003
IEEE
113views Biometrics» more  HICSS 2003»
14 years 1 months ago
Characteristics of IT Outsourcing Contracts
Once the decision to outsource an activity has been made, managers are faced with issues related to the management of the relationship with their service providers. A critical ele...
Benoit Aubert, Jean-Francois Houde, Michel Patry, ...
WWW
2007
ACM
14 years 8 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
SAC
2009
ACM
14 years 3 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
ATAL
2009
Springer
14 years 2 months ago
Pragmatic-strategic reputation-based decisions in BDI agents
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the...
Isaac Pinyol, Jordi Sabater-Mir
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 2 months ago
Connected Giving: Ordinary People Coordinating Disaster Relief on the Internet
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...