Sciweavers

1229 search results - page 38 / 246
» Trusted Computing
Sort
View
COMPUTER
2000
75views more  COMPUTER 2000»
13 years 7 months ago
Can You Trust Software Capability Evaluations?
Emilie O'Connell, Hossein Saiedian
COMPUTER
1998
50views more  COMPUTER 1998»
13 years 7 months ago
Providing Trusted Components to the Industry
Bertrand Meyer, Christine Mingins, Heinz W. Schmid...
POLICY
2007
Springer
14 years 1 months ago
A Socio-cognitive Approach to Modeling Policies in Open Environments
The richness of today’s electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current intera...
Tatyana Ryutov
APSCC
2008
IEEE
13 years 9 months ago
Understanding Cyber Trust Using a Triadic Functioning Analysis
Although social informatics has been a subject of systematic analytical and critical research for more than three decades, previous research has rarely noted the importance of soc...
Wen-Kung Lin, Chieh-Peng Lin, Chou-Kang Chiu
BIRTHDAY
2004
Springer
14 years 1 months ago
On the Formal Modelling of Trust in Reputation-Based Systems
In a reputation-based trust management system an entity’s behaviour determines its reputation which in turn affects other entities interaction with it. We present a mathematical...
Mogens Nielsen, Karl Krukow