Sciweavers

1120 search results - page 57 / 224
» Trust in Electronic Environments
Sort
View
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
14 years 4 months ago
E-File Adoption: A Study of U.S. Taxpayers' Intentions
In the United States, congress has set goals for the diffusion of e-government initiatives. One of congress’ goals for 2007 was for 80% of tax and informational returns to be fil...
L. Christian Schaupp, Lemuria Carter, Jeff Hobbs
ESORICS
2003
Springer
14 years 3 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
DAGSTUHL
2007
13 years 11 months ago
An Axiomatic Approach to Personalized Ranking Systems
Personalized ranking systems and trust systems are an essential tool for collaboration in a multi-agent environment. In these systems, trust relations between many agents are aggr...
Alon Altman, Moshe Tennenholtz
SIGOPS
2011
210views Hardware» more  SIGOPS 2011»
13 years 5 months ago
Small trusted primitives for dependable systems
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Petros Maniatis, Byung-Gon Chun
AAAI
2010
13 years 9 months ago
A Trust Model for Supply Chain Management
hey generalize these factors to the abstract concepts of ability, integrity, and benevolence. This model does not use probabilistic decision theory. Other SCM trust factors have be...
Yasaman Haghpanah, Marie desJardins