Sciweavers

ITRUST
2005
Springer
14 years 6 months ago
Towards a Generic Trust Model - Comparison of Various Trust Update Algorithms
Michael Kinateder, Ernesto Baschny, Kurt Rothermel
ITRUST
2005
Springer
14 years 6 months ago
Multimedia Copyright Protection Platform Demonstrator
The work presented in this paper consists in the development of a portable platform to protect the copyright and distribution rights of digital contents, and empirically demonstrat...
Miguel Soriano, Marcel Fernandez, Elisa Sayrol, Jo...
ITRUST
2005
Springer
14 years 6 months ago
Security and Trust in the Italian Legal Digital Signature Framework
Abstract. The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities. In this paper we describe each of...
Stefano Zanero
ITRUST
2005
Springer
14 years 6 months ago
IWTrust: Improving User Trust in Answers from the Web
Abstract. Question answering systems users may find answers without any supporting information insufficient for determining trust levels. Once those question answering systems beg...
Ilya Zaihrayeu, Paulo Pinheiro da Silva, Deborah L...
ITRUST
2005
Springer
14 years 6 months ago
Can We Manage Trust?
The term trust management suggests that trust can be managed, for example by creating trust, by assessing trustworthiness, or by determining optimal decisions based on specific le...
Audun Jøsang, Claudia Keser, Theodosis Dimi...
ITRUST
2005
Springer
14 years 6 months ago
Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language
The paper makes two main contributions: (1) It presents experiences from using the CORAS language for security threat modelling to specify legal risk scenarios. These experiences a...
Fredrik Vraalsen, Mass Soldal Lund, Tobias Mahler,...
ITRUST
2005
Springer
14 years 6 months ago
Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment
The Grid vision is to allow heterogeneous computational resources to be shared and utilised globally. Grid users are able to submit tasks to remote resources for execution. Howeve...
Nathan Griffiths, Kuo-Ming Chao
ITRUST
2005
Springer
14 years 6 months ago
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, th...
Jean-Marc Seigneur, Alan Gray, Christian Damsgaard...
ITRUST
2005
Springer
14 years 6 months ago
Modeling Social and Individual Trust in Requirements Engineering Methodologies
Abstract. When we model and analyze trust in organizations or information systems we have to take into account two different levels of analysis: social and individual. Social leve...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...