Sciweavers

1715 search results - page 90 / 343
» Trust and Reputation Systems
Sort
View
NBIS
2007
Springer
14 years 3 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
IPPS
2007
IEEE
14 years 4 months ago
Evolution of Strategy Driven Behavior in Ad Hoc Networks Using a Genetic Algorithm
In this paper we address the problem of selfish behavior in ad hoc networks. We propose a strategy driven approach which aims at enforcing cooperation between network participant...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
COMPSAC
2008
IEEE
14 years 4 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
TRUST
2009
Springer
14 years 4 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
CHI
2006
ACM
14 years 10 months ago
Reinventing trust, collaboration and compliance in social systems
The objective of this paper is to set the research agenda for a workshop focusing on novel approaches to supporting trust, collaboration, and compliance in social systems. Suggest...
Jens Riegelsberger, Asimina Vasalou, Philip Bonhar...