Sciweavers

1120 search results - page 103 / 224
» Trust in Electronic Environments
Sort
View
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
14 years 3 months ago
The Efficacy of Mobile e-Procurement: A Pilot Study
This paper reports on an empirical study to assess the impacts, benefits, and critical success factors of mobile applications to enhance an electronic procurement system. For diff...
Judith Gebauer, Michael J. Shaw, Kexin Zhao
MC
2001
201views Computer Science» more  MC 2001»
13 years 11 months ago
Awareness in Context-Aware Information Systems
The paper describes the idea of bringing awareness to nomadic users. Based on a discussion of different context models and approaches to model context, several scenarios for aware...
Tom Gross, Marcus Specht
SUTC
2008
IEEE
14 years 4 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
ATAL
2004
Springer
14 years 3 months ago
RDS: Remote Distributed Scheme for Protecting Mobile Agents
As of today no solely software-based solution that a priori protects the computation of any mobile code and/or mobile agent was presented. Furthermore, Algesheimer et al. [1], arg...
Asnat Dadon-Elichai
FC
2006
Springer
108views Cryptology» more  FC 2006»
14 years 2 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion