Sciweavers

1139 search results - page 19 / 228
» Trust Management Survey
Sort
View
ACISP
2000
Springer
14 years 8 days ago
PKI Seeks a Trusting Relationship
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
Audun Jøsang, Ingar Glenn Pedersen, Dean Po...
CCS
2006
ACM
13 years 11 months ago
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay a...
Luis F. G. Sarmenta, Marten van Dijk, Charles W. O...
HICSS
2000
IEEE
132views Biometrics» more  HICSS 2000»
14 years 10 days ago
The Impacts of Relational and Trust Development Training on Virtual Teams: An Exploratory Investigation
Virtual teams are becoming common place in many organizations. These teams are geographically distributed and communicate via computer-mediated communication systems. Two factors ...
Peggy M. Beranek
CIDR
2009
126views Algorithms» more  CIDR 2009»
13 years 9 months ago
Declarative Reconfigurable Trust Management
In recent years, there has been a proliferation of declarative logic-based trust management languages and systems proposed to ease the description, configuration, and enforcement ...
William R. Marczak, David Zook, Wenchao Zhou, Molh...
WICSA
2004
13 years 9 months ago
PACE: An Architectural Style for Trust Management in Decentralized Applications
Distributed applications that lack a central, trustworthy authority for control and validation are properly termed decentralized. Multiple, independent agencies, or "partners...
Girish Suryanarayana, Justin R. Erenkrantz, Scott ...