Sciweavers

150
Voted
IFIPTM
2009
171views Management» more  IFIPTM 2009»
14 years 10 months ago
Trust-Enhanced Recommender Systems for Efficient On-Line Collaboration
Trust has been explored by many researchers in the past as a solution for assisting the process of recommendation production. In this work we are examining the feasibility of build...
Georgios Pitsilis
97
Voted
IFIPTM
2009
163views Management» more  IFIPTM 2009»
14 years 10 months ago
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. Thes...
Adam J. Lee, Marianne Winslett, Kenneth J. Perano
110
Voted
IFIPTM
2009
149views Management» more  IFIPTM 2009»
14 years 10 months ago
An Experimental Testbed for Evaluation of Trust and Reputation Systems
Abstract. To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy...
Reid Kerr, Robin Cohen
104
Voted
IFIPTM
2009
127views Management» more  IFIPTM 2009»
14 years 10 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp
138
Voted
IFIPTM
2009
119views Management» more  IFIPTM 2009»
14 years 10 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
Management
Top of PageReset Settings