Sciweavers

2907 search results - page 7 / 582
» Trust analysis with clustering
Sort
View
APSCC
2008
IEEE
13 years 9 months ago
Understanding Cyber Trust Using a Triadic Functioning Analysis
Although social informatics has been a subject of systematic analytical and critical research for more than three decades, previous research has rarely noted the importance of soc...
Wen-Kung Lin, Chieh-Peng Lin, Chou-Kang Chiu
IFIP
2005
Springer
14 years 1 months ago
Relative Trustworthiness
We present a method for trust scenarios with more than one trustee, where sets of trustees are ordered in a relation of relative trustworthiness. We show how a priority structure i...
Johan W. Klüwer, Arild Waaler
CIKM
2009
Springer
14 years 2 months ago
StereoTrust: a group based personalized trust model
Trust plays important roles in diverse decentralized environments, including our society at large. Computational trust models help to, for instance, guide users’ judgements in o...
Xin Liu, Anwitaman Datta, Krzysztof Rzadca, Ee-Pen...
ATAL
2005
Springer
14 years 1 months ago
Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model
This research aims to develop a model of trust and reputation that will ensure good interactions amongst software agents in large scale open systems. The following are key drivers...
W. T. Luke Teacy, Jigar Patel, Nicholas R. Jenning...
RE
2004
Springer
14 years 1 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...