—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
: This research has attempted to find the impact of information quality (IQ) and system quality (SQ) on users’ attitude to adopt the interactive TV based auction service. The pri...
Software agent marketplaces require the development of new architectures, which are capable of coping with unreliable computational and network infrastructures, limited trust amon...
Chrysanthos Dellarocas, Mark Klein, Juan A. Rodr&i...
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...