Sciweavers

163 search results - page 8 / 33
» What Instills Trust
Sort
View
ISN
1998
Springer
13 years 11 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
ECSCW
2011
12 years 7 months ago
The Hugging Team: The Role of Technology in Business Networking Practices
Technological devices for social networking are produced in droves and networking through media seems to be the way of getting ahead in business. We examine what role technology pl...
Anne Thorsø Sørensen, Irina Shklovsk...
CCGRID
2006
IEEE
13 years 11 months ago
Evaluating Provenance-based Trust for Scientific Workflows
Provenance is the documentation concerning the origin of a result generated by a process, and provides explanations about who, how, what resources were used in a process, and the ...
Shrija Rajbhandari, Ian Wootten, Ali Shaikh Ali, O...
BCSHCI
2007
13 years 8 months ago
Is an apology enough?: how to resolve trust breakdowns in episodic online interactions
This paper addresses what kind of system allows the victim of a trust breakdown to fairly assess an unintentional offender who is also a benevolent member. Two systems were compar...
Asimina Vasalou, Astrid Hopfensitz, Jeremy Pitt
ACSAC
2004
IEEE
13 years 11 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...