Sciweavers

2907 search results - page 10 / 582
» Trust analysis with clustering
Sort
View
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 1 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
SEMWEB
2007
Springer
14 years 1 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines
COMPSAC
2008
IEEE
14 years 2 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
JTAER
2010
124views more  JTAER 2010»
13 years 2 months ago
What factors influence online brand trust: evidence from online tickets buyers in Malaysia
This study examines online brand trust and its influencing factors in the specific context of online air ticket buyers in Malaysia. Summarizing academic literature on online brand...
Syed Shah Alam, Norjaya Mohd Yasin
SEC
2007
13 years 9 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...