Sciweavers

1139 search results - page 33 / 228
» Trust Management Survey
Sort
View
CISIS
2010
IEEE
14 years 2 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
DAGSTUHL
2001
13 years 9 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
WETICE
2003
IEEE
14 years 1 months ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
CAISE
2007
Springer
14 years 2 months ago
Achieving trust in IT outsourcing relationships
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
Eva Söderström, Christian Lennerholt
ECRA
2002
165views more  ECRA 2002»
13 years 7 months ago
Effect of trust on customer acceptance of Internet banking
Two beliefs, ease of use and usefulness, have been considered to be fundamental in determining the acceptance of various IS in the past decades. These beliefs may not, however, fu...
Bomil Suh, Ingoo Han