Sciweavers

791 search results - page 54 / 159
» Users and Trust in Cyberspace
Sort
View
DBSEC
2003
113views Database» more  DBSEC 2003»
13 years 9 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
ECIS
2003
13 years 9 months ago
An empirical investigation of intelligent agents for e-business customer relationship management: a knowledge management perspec
: Using a knowledge management perspective, this paper investigates new and efficient ways of applying intelligent agents to e-business customer relationship management. Intelligen...
Weiquan Wang, Izak Benbasat
WMCSA
2008
IEEE
14 years 2 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
AI
2010
Springer
13 years 11 months ago
Optimizing Advisor Network Size in a Personalized Trust-Modelling Framework for Multi-agent Systems
Abstract. This paper explores potential improvements to Zhang’s personalized trust approach for e-commerce, in particular examining means of optimizing the number of advisors tha...
Joshua Gorner
ETRICS
2006
13 years 11 months ago
Transitive Trust in Mobile Scenarios
rorizontl integrtion of ess tehnologies to networks nd servies should e ompnied y some kind of onvergene of uthentiE tion tehnologiesF he missing link for the federtion of user ide...
Nicolai Kuntze, Andreas U. Schmidt