Sciweavers

2907 search results - page 38 / 582
» Trust analysis with clustering
Sort
View
SE
2008
13 years 11 months ago
Eliminating Trust From Application Programs By Way Of Software Architecture
: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Michael Franz
DGO
2003
85views Education» more  DGO 2003»
13 years 11 months ago
Trust Resource Management in Digital Government Through Process Modeling
This paper explores the use of process technology to create formal process models to increase the level of trust that stakeholders have in digital government. Digital Government s...
Lee Osterwil, Norman K. Sondheimer, Anthony Butter...
ASUNAM
2010
IEEE
13 years 1 months ago
A Study on Social Network Metrics and Their Application in Trust Networks
Social network analysis has recently gained a lot of interest because of the advent and the increasing popularity of social media, such as blogs, social networks, microblogging, o...
Iraklis Varlamis, Magdalini Eirinaki, Malamati D. ...
COLCOM
2008
IEEE
14 years 4 months ago
Incentive and Trust Issues in Assured Information Sharing
Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different secur...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
ERCIMDL
2007
Springer
129views Education» more  ERCIMDL 2007»
14 years 4 months ago
Know Thy Sensor: Trust, Data Quality, and Data Integrity in Scientific Digital Libraries
For users to trust and interpret the data in scientific digital libraries, they must be able to assess the integrity of those data. Criteria for data integrity vary by context, by ...
Jillian C. Wallis, Christine L. Borgman, Matthew S...