Sciweavers

4897 search results - page 65 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
14 years 2 months ago
Internet Use, Transparency, and Interactivity Effects on Trust in Government
This paper asks how internet use, citizen satisfaction with e-government and citizen trust in government are interrelated. Prior research has found that agencies stress informatio...
Eric W. Welch, Charles C. Hinnant
ASPLOS
2008
ACM
13 years 11 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
WWW
2011
ACM
13 years 4 months ago
Trust analysis with clustering
Web provides rich information about a variety of objects. Trustability is a major concern on the web. Truth establishment is an important task so as to provide the right informati...
Manish Gupta, Yizhou Sun, Jiawei Han
AIMSA
2004
Springer
14 years 27 days ago
Identification of Communities of Peers by Trust and Reputation
In: Proceedings of the Eleventh International Conference on Artificial Intelligence: Methodology, Systems, Applications (AIMSA-04), Springer-Verlag LNAI Series. c 2004 We present ...
Alessandro Agostini, Gianluca Moro
ICICS
2005
Springer
14 years 2 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...