Sciweavers

1229 search results - page 63 / 246
» Trusted Computing
Sort
View
CISIS
2009
IEEE
14 years 6 months ago
A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server
—Deployment of open source software for embedded system is increasing while ubiquitous devices have become widely used. System designer need to cope with malicious input which is...
Ruo Ando
NDSS
1999
IEEE
14 years 3 months ago
An Algebra for Assessing Trust in Certification Chains
Open networks allow users to communicate without any prior arrangements such as contractual agreement or organisation membership. However, the very nature of open networks makes a...
Audun Jøsang
CHI
2001
ACM
14 years 11 months ago
Relational agents: a model and implementation of building user trust
Building trust with users is crucial in a wide range of applications, such as advice-giving or financial transactions, and some minimal degree of trust is required in all applicat...
Timothy W. Bickmore, Justine Cassell
PDP
2010
IEEE
14 years 6 months ago
Trusted Interaction Patterns in Large-scale Enterprise Service Networks
Abstract—The evolution towards cross-organizational collaboration and interaction patterns has led to the emergence of scalable, Web services-based composition infrastructures. T...
Florian Skopik, Daniel Schall, Schahram Dustdar
GI
2005
Springer
14 years 4 months ago
Trust and quality in electronic communication: Getting to know your customers bit by bit
: A client was experiencing trust and information quality problems in his structured Internet communication with potential and existing customers. Customer information entered onli...
Andreas Neus, Philipp Scherf, Christian Gebert