Sciweavers

CSE
2009
IEEE
14 years 6 months ago
Privacy-Preserving Multi-agent Constraint Satisfaction
—Constraint satisfaction has been a very successful paradigm for solving problems such as resource allocation and planning. Many of these problems pose themselves in a context in...
Thomas Léauté, Boi Faltings
CSE
2009
IEEE
14 years 6 months ago
Trust Is in the Eye of the Beholder
We carefully investigate humanity’s intuitive understanding of trust and extract from it fundamental properties that succinctly synthesize how trust works. From this detailed ch...
Dimitri do B. DeFigueiredo, Earl T. Barr, Shyhtsun...
CSE
2009
IEEE
14 years 6 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
CSE
2009
IEEE
14 years 6 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
CSE
2009
IEEE
14 years 6 months ago
Designing Privacy for Scalable Electronic Healthcare Linkage
—A unified electronic health record (EHR) has potentially immeasurable benefits to society, and the current healthcare industry drive to create a single EHR reflects this. Howeve...
Anthony Stell, Richard O. Sinnott, Oluwafemi Ajayi...
CSE
2009
IEEE
14 years 6 months ago
Tuning Evidence-Based Trust Models
Abstract—Many evidence-based trust models require the adjustment of parameters such as aging- or exploration-factors. What the literature often does not address is the systematic...
Eugen Staab, Thomas Engel
CSE
2009
IEEE
14 years 6 months ago
A Framework to Balance Privacy and Data Usability Using Data Degradation
—Personal data is a valuable asset for service providers. To collect such data, free services are offered to users, for whom the risk of loosing privacy by subscribing to a servi...
Harold van Heerde, Maarten M. Fokkinga, Nicolas An...
CSE
2009
IEEE
14 years 6 months ago
Towards Automating Social Engineering Using Social Networking Sites
—A growing number of people use social networking sites to foster social relationships among each other. While the advantages of the provided services are obvious, drawbacks on a...
Markus Huber, Stewart Kowalski, Marcus Nohlberg, S...
CSE
2009
IEEE
14 years 6 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...