Sciweavers

1120 search results - page 72 / 224
» Trust in Electronic Environments
Sort
View
DEXAW
1999
IEEE
98views Database» more  DEXAW 1999»
14 years 3 months ago
Shaping the Research Agenda for Security in E-Commerce
In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applicat...
Rolf Oppliger
AISM
2004
14 years 5 days ago
PKI - Advantages and Obstacles
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
A. Jancic, Matthew J. Warren
HPCC
2007
Springer
14 years 4 months ago
Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks
In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterhead...
Qiang Zhang, Guangming Hu, Zhenghu Gong
SACMAT
2003
ACM
14 years 4 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
ECRA
2002
165views more  ECRA 2002»
13 years 10 months ago
Effect of trust on customer acceptance of Internet banking
Two beliefs, ease of use and usefulness, have been considered to be fundamental in determining the acceptance of various IS in the past decades. These beliefs may not, however, fu...
Bomil Suh, Ingoo Han