Once the decision to outsource an activity has been made, managers are faced with issues related to the management of the relationship with their service providers. A critical ele...
Benoit Aubert, Jean-Francois Houde, Michel Patry, ...
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the...
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...