Sciweavers

4142 search results - page 104 / 829
» Trusting an Information Agent
Sort
View
129
Voted
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
CSCW
2008
ACM
15 years 5 months ago
Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia
Wikipedia has become one of the most important information resources on the Web by promoting peer collaboration and enabling virtually anyone to edit anything. However, this mutab...
Aniket Kittur, Bongwon Suh, Ed H. Chi
157
Voted
CCGRID
2006
IEEE
15 years 7 months ago
Evaluating Provenance-based Trust for Scientific Workflows
Provenance is the documentation concerning the origin of a result generated by a process, and provides explanations about who, how, what resources were used in a process, and the ...
Shrija Rajbhandari, Ian Wootten, Ali Shaikh Ali, O...
105
Voted
P2P
2003
IEEE
15 years 8 months ago
Establishing Trust in Distributed Storage Providers
— Corporate IT as well as individuals show increasing interest in reliable outsourcing of storage infrastructure. Decentralized solutions with their resilience against partial ou...
Germano Caronni, Marcel Waldvogel
IDTRUST
2010
ACM
15 years 10 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier