Sciweavers

1120 search results - page 22 / 224
» Trust in Electronic Environments
Sort
View
SPC
2005
Springer
14 years 1 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 4 days ago
Optimistic Fair Exchange with Transparent Signature Recovery
In this paper, we propose a new practical fair exchange protocol allowing the exchange of an electronic item against a signature. The protocol is based on the Guillou-Quisquater s...
Olivier Markowitch, Shahrokh Saeednia
SIGECOM
2000
ACM
117views ECommerce» more  SIGECOM 2000»
14 years 18 hour ago
An exception-handling architecture for open electronic marketplaces of contract net software agents
Software agent marketplaces require the development of new architectures, which are capable of coping with unreliable computational and network infrastructures, limited trust amon...
Chrysanthos Dellarocas, Mark Klein, Juan A. Rodr&i...
ECWEB
2000
Springer
103views ECommerce» more  ECWEB 2000»
14 years 3 hour ago
Security of Electronic Business Applications - Structure and Quantification
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Konstantin Knorr, Susanne Röhrig
NCA
2006
IEEE
14 years 1 months ago
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing
Modern distributed information systems handle increasingly critical data and computation, but there is no systematic way to assess whether a given part of the system can be entrus...
Partha Pratim Pal, Franklin Webber, Michael Atighe...