Sciweavers

163 search results - page 9 / 33
» What Instills Trust
Sort
View
BXML
2004
13 years 8 months ago
Trust and context using the RDF-Source related Storage System (RDF-S3) and easy RQL (eRQL)
Abstract. There exist different ways how to understand and use context information for RDF data. This paper summarizes these different ways and concentrates on the source informati...
Karsten Tolle, Fabian Wleklinski
JAPLL
2008
88views more  JAPLL 2008»
13 years 7 months ago
Living up to one's commitments: Agency, strategies and trust
In human social interaction, the notions of commitment and trust are strongly interrelated. A formal model for this interrelation will enable artificial agents to benefit from the...
Thomas Müller
CCS
2000
ACM
13 years 11 months ago
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts...
Ting Yu, Xiaosong Ma, Marianne Winslett
ACSAC
2004
IEEE
13 years 11 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
DISCEX
2003
IEEE
14 years 20 days ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...