Sciweavers

122 search results - page 14 / 25
» Trust and technologies: Implications for organizational work...
Sort
View
CCS
2010
ACM
14 years 3 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
HICSS
2005
IEEE
100views Biometrics» more  HICSS 2005»
14 years 2 months ago
'Today' Messages: Lightweight Support for Small Group Awareness via Email
‘Today’ messages are short status emails sent daily by members of a project team. We present the results of a field study of the use of ‘today’ messages by six small work ...
A. J. Bernheim Brush, Alan Borning
CCS
2006
ACM
14 years 5 days ago
Daonity: grid security with behaviour conformity from trusted computing
A central security requirement for grid computing can be referred to as behaviour conformity. This is an assurance that ad hoc related principals (users, platforms or instruments)...
Wenbo Mao, Fei Yan, Chunrun Chen
ICIW
2009
IEEE
13 years 6 months ago
Using Propagation of Distrust to Find Untrustworthy Web Neighborhoods
Web spamming, the practice of introducing artificial text and links into web pages to affect the results of searches, has been recognized as a major problem for search engines. Bu...
Panagiotis Takis Metaxas
SIGSOFT
2001
ACM
14 years 9 months ago
An empirical study on the utility of formal routines to transfer knowledge and experience
Most quality and software process improvement frameworks emphasize written (i.e. formal) documentation to convey recommended work practices. However, there is considerable skeptic...
Reidar Conradi, Tore Dybå