Sciweavers

3021 search results - page 17 / 605
» Trust in recommender systems
Sort
View
EUC
2008
Springer
14 years 20 days ago
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...
Omar Hasan, Jean-Marc Pierson, Lionel Brunie
HPDC
2010
IEEE
14 years 4 hour ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
ATAL
2004
Springer
14 years 4 months ago
A Trust Analysis Methodology for Pervasive Computing Systems
Abstract. We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that des...
Stéphane Lo Presti, Michael J. Butler, Mich...
HICSS
2000
IEEE
139views Biometrics» more  HICSS 2000»
14 years 3 months ago
Supporting Trust in Virtual Communities
At any given time, the stability of a community depends on the right balance of trust and distrust. Furthermore, we face information overload, increased uncertainty and risk takin...
Alfarez Abdul-Rahman, Stephen Hailes
JCP
2008
104views more  JCP 2008»
13 years 11 months ago
Trusted Decision Mechanism Based on Fuzzy Logic for Open Network
Trust mechanism will be an important trend in the field of security for open network. But, as an important factor risk is little considered in trust model. In this paper, Further w...
Lin Zhang, Ruchuan Wang, Haiyan Wang