Sciweavers

791 search results - page 25 / 159
» Users and Trust in Cyberspace
Sort
View
COMPSAC
2008
IEEE
14 years 2 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
KESAMSTA
2007
Springer
14 years 1 months ago
Application of Agent-Based Personal Web of Trust to Local Document Ranking
Web is the boundless source of information and no one is able to process the vast amount of new documents published on the web every day, even with filtering out the documents the ...
Marek Kopel, Przemyslaw Kazienko
DSS
2007
104views more  DSS 2007»
13 years 7 months ago
Investigating interactions of trust and interest similarity
Online communities that allow their users to express their personal preferences, such as the members they trust and the products they appreciate, are becoming increasingly popular...
Cai-Nicolas Ziegler, Jennifer Golbeck
SAC
2008
ACM
13 years 7 months ago
Increasing trust through the use of 3d e-commerce environment
Existing 2D e-commerce internet websites provide users with only relatively simple, browser-based interface to access available products and services. These websites often lack in...
Nasser Nassiri
CSCW
2012
ACM
12 years 3 months ago
Community-based web security: complementary roles of the serious and casual contributors
Does crowdsourcing work for web security? While the herculean task of evaluating hundreds of millions of websites can certainly benefit from the wisdom of crowds, skeptics questi...
Pern Hui Chia, John Chuang