Sciweavers

1229 search results - page 13 / 246
» Trusted Computing
Sort
View
CASCON
2006
85views Education» more  CASCON 2006»
13 years 9 months ago
Trust by design: information requirements for appropriate trust in automation
Trust has, since the early stages of IBM's Autonomic Computing (AC) initiative, been recognized as an important factor in the success of new autonomic features. If operators ...
Pierre P. Duez, Michael Zuliani, Greg A. Jamieson
CHI
2008
ACM
14 years 8 months ago
Recovering trust and avoiding escalation: an overlooked design goal of social systems
The online trust discussion is focused on mechanisms for building and maintaining user trust. This paper introduces the relevance of providing for the repair of trust breakdowns. ...
Asimina Vasalou, Jens Riegelsberger
ICDCSW
2003
IEEE
14 years 27 days ago
Survivable Multi-Level Ad-Hoc Group Operations
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishin...
Dan Zhou, Jie Wu
IEEEARES
2008
IEEE
14 years 2 months ago
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
We present a secure e-commerce architecture that is resistant to client compromise and man-in-the-middle attacks on SSL. To this end, we propose several security protocols that us...
Frederic Stumpf, Claudia Eckert, Shane Balfe
EEE
2004
IEEE
13 years 11 months ago
Spreading Activation Models for Trust Propagation
Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subj...
Cai-Nicolas Ziegler, Georg Lausen