Sciweavers

791 search results - page 13 / 159
» Users and Trust in Cyberspace
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Tuning Evidence-Based Trust Models
Abstract—Many evidence-based trust models require the adjustment of parameters such as aging- or exploration-factors. What the literature often does not address is the systematic...
Eugen Staab, Thomas Engel
DEXAW
2003
IEEE
131views Database» more  DEXAW 2003»
14 years 25 days ago
Privacy and Trusted Computing
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user ...
Juan Manuel González Nieto, Ed Dawson, Eiji...
INTR
2007
100views more  INTR 2007»
13 years 7 months ago
Web services access control architecture incorporating trust
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of ...
Marijke Coetzee, Jan H. P. Eloff
WEBI
2010
Springer
13 years 5 months ago
Let's Trust Users It is Their Search
The current search engine model considers users not trustworthy, so no tools are provided to let them specify what they are looking for or in what context, which severely limits wh...
Pavel Kalinov, Bela Stantic, Abdul Sattar
PODC
2010
ACM
13 years 11 months ago
Brief announcement: anonymity and trust in distributed systems
In this paper, we present a framework for achieving anonymity and trust, two seemingly contradictory properties, in distributed systems. Our approach builds on webs of trust, a we...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...