Sciweavers

334 search results - page 26 / 67
» trust 2010
Sort
View
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
14 years 1 months ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
ICDIM
2010
IEEE
13 years 7 months ago
Social network collaborative filtering framework and online trust factors: A case study on Facebook
Recommender systems have been proposed to exploit the potential of social network by filtering the information and offer recommendations to a user that he is predicted to like. Co...
Wei Chen, Simon Fong
JUCS
2010
141views more  JUCS 2010»
13 years 8 months ago
Trust-Oriented Composite Service Selection with QoS Constraints
Abstract: In Service-Oriented Computing (SOC) environments, service clients interact with service providers for consuming services. From the viewpoint of service clients, the trust...
Lei Li, Yan Wang, Ee-Peng Lim
CHI
2010
ACM
13 years 7 months ago
Trying too hard: effects of mobile agents' (Inappropriate) social expressiveness on trust, affect and compliance
Mobile services can provide users with information relevant to their current circumstances. Distant services in turn can acquire local information from people in an area of intere...
Henriette S. M. Cramer, Vanessa Evers, Tim van Slo...
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 10 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen