Sciweavers

1117 search results - page 32 / 224
» A Compliance Model of Trust
Sort
View
WETICE
2003
IEEE
15 years 7 months ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
RE
2010
Springer
14 years 8 months ago
Dependability Arguments with Trusted Bases
An approach is suggested for arguing that a system is dependable. The key idea is to structure the system so that critical requirements are localized in small, reliable subsets of ...
Eunsuk Kang, Daniel Jackson
ACISP
2000
Springer
15 years 6 months ago
PKI Seeks a Trusting Relationship
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
Audun Jøsang, Ingar Glenn Pedersen, Dean Po...
128
Voted
GD
2008
Springer
15 years 2 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
103
Voted
IAT
2009
IEEE
15 years 8 months ago
How Do Agents Comply with Norms?
—The import of the notion of institution in the design of MASs requires to develop formal and efficient methods for modeling the interaction between agents’ behaviour and norm...
Guido Governatori, Antonino Rotolo