Research on knowledge management (KM) readiness has matured. However, recent organizational structures have emerged which prevent traditional instruments from adequately measuring...
Mark Keith, Michael Goul, Haluk Demirkan, Jason Ni...
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Abstract. This research aims to develop a model of trust and reputation that will ensure good interactions amongst software agents in large scale open systems in particular. The fo...
Jigar Patel, W. T. Luke Teacy, Nicholas R. Jenning...