Sciweavers

220 search results - page 10 / 44
» Trusted business system model using context sensitiveness
Sort
View
HICSS
2008
IEEE
317views Biometrics» more  HICSS 2008»
14 years 3 months ago
Trust in Online Shopping: The Korean Student Experience
E-commerce has become an important part of business. In South Korea, the market size of online shopping malls was 13,460 billion Korean Won in 2006, and this figure keeps growing....
Ji-Seok Yoo, Jae-Nam Lee, Julian Hoffmann
SRDS
2010
IEEE
13 years 6 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
SAC
2004
ACM
14 years 2 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
USS
2008
13 years 11 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
IEEEARES
2006
IEEE
14 years 2 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner