Sciweavers

1117 search results - page 41 / 224
» A Compliance Model of Trust
Sort
View
BNCOD
2006
85views Database» more  BNCOD 2006»
15 years 3 months ago
Trust Obstacle Mitigation for Database Systems
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model...
Victor Page, Robin C. Laney, Maurice Dixon, Charle...
SCN
2010
Springer
145views Communications» more  SCN 2010»
14 years 8 months ago
A guide to trust in mobile ad hoc networks
In this paper we examine issues of trust and reputation in Mobile Ad hoc Networks. We look at a number of the trust and reputation models that have been proposed and we highlight o...
Shane Balfe, Po-Wah Yau, Kenneth G. Paterson
COORDINATION
2010
Springer
15 years 1 months ago
Behavioural Contracts with Request-Response Operations
In the context of service-oriented computing, behavioural contracts are descriptions of the message-passing behaviour of services. They can be used to check properties of service c...
Lucia Acciai, Michele Boreale, Gianluigi Zavattaro
ACISICIS
2007
IEEE
15 years 8 months ago
Trust Realisation in Multi-domain Collaborative Environments
In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for ...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
COMPSAC
2006
IEEE
15 years 7 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver