Sciweavers

1229 search results - page 40 / 246
» Trusted Computing
Sort
View
GCC
2004
Springer
14 years 1 months ago
Trust Establishment in Large Scale Grid Settings
Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...
IDTRUST
2009
ACM
14 years 2 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
ICDCS
2007
IEEE
14 years 2 months ago
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By t...
Anna Cinzia Squicciarini, Alberto Trombetta, Elisa...
HCI
2009
13 years 5 months ago
Trust in Online Technology: Towards Practical Guidelines Based on Experimentally Verified Theory
Abstract. A large amount of research attempts to define trust, yet relatively little research attempts to experimentally verify what makes trust needed in interactions with humans ...
Christian Detweiler, Joost Broekens
ISEM
2008
88views more  ISEM 2008»
13 years 7 months ago
Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments
As it lacks central management in Peer-to-Peer (P2P) e-commerce environments, prior to new transactions with an unknown peer, the trust evaluation is critical, which relies on the ...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...