Sciweavers

1120 search results - page 82 / 224
» Trust in Electronic Environments
Sort
View
CSCW
2008
ACM
14 years 13 days ago
Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia
Wikipedia has become one of the most important information resources on the Web by promoting peer collaboration and enabling virtually anyone to edit anything. However, this mutab...
Aniket Kittur, Bongwon Suh, Ed H. Chi
ENTCS
2006
80views more  ENTCS 2006»
13 years 10 months ago
Synchronisation in Trust Management Using Push Authorisation
Traditional trust management authorisation decisions for distributed technologies, are, in general, based on the history of the authorisations/computation to date. We consider thi...
Thomas B. Quillinan, Simon N. Foley
IJMI
2002
142views more  IJMI 2002»
13 years 10 months ago
Quality assured trusted third parties for deploying secure internet-based healthcare applications
In this paper we present a complete reference framework for the provision of quality assured Trusted Third Party (TTP) services within a medical environment. The main objective is...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
PROCEDIA
2010
153views more  PROCEDIA 2010»
13 years 9 months ago
Conceptual framework for dynamic trust monitoring and prediction
The dynamic and collaborative nature of mobile and sensor networks raises the issue of how connected mobile devices can be trusted. Despite the existing security paradigms such as...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
WETICE
1998
IEEE
14 years 2 months ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes