Sciweavers

2022 search results - page 214 / 405
» Trust in Multi-Agent Systems
Sort
View
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 2 months ago
SME E-Procurement Adoption in Hong Kong - The Roles of Power, Trust and Value
The objective of this research is to test a model of electronic procurement (e-procurement) adoption behavior by Small- to Medium-sized Enterprises (SME). We investigate the pheno...
Joyce K. Y. Chan, Matthew K. O. Lee
DGO
2003
85views Education» more  DGO 2003»
13 years 10 months ago
Trust Resource Management in Digital Government Through Process Modeling
This paper explores the use of process technology to create formal process models to increase the level of trust that stakeholders have in digital government. Digital Government s...
Lee Osterwil, Norman K. Sondheimer, Anthony Butter...
ESSOS
2009
Springer
14 years 4 months ago
Idea: Trusted Emergency Management
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency i...
Timothy E. Levin, Cynthia E. Irvine, Terry Benzel,...
ISPEC
2007
Springer
14 years 3 months ago
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do no...
Yanjiang Yang, Robert H. Deng, Feng Bao
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
14 years 2 months ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu