Sciweavers

60 search results - page 2 / 12
» Overcoming Fear with Trust
Sort
View
ACSAC
2002
IEEE
13 years 10 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
NDSS
2002
IEEE
13 years 10 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
JTAER
2010
135views more  JTAER 2010»
13 years 3 months ago
Developing Trust In Virtual Software Development Teams
Today globally distributed software development has become the norm for many organizations and the popularity of implementing such an approach continues to increase. In these circ...
Valentine Casey
SEC
2007
13 years 6 months ago
Exploratory survey on an Evaluation Model for a Sense of Security
Research in information security is no longer limited to technical issues: human-related issues such as trust and the sense of security are also required by the user. In this paper...
Natsuko Hikage, Yuko Murayama, Carl Hauser
CN
2004
163views more  CN 2004»
13 years 5 months ago
Highly reliable trust establishment scheme in ad hoc networks
Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...