Sciweavers

1117 search results - page 80 / 224
» A Compliance Model of Trust
Sort
View
126
Voted
TPDS
2008
116views more  TPDS 2008»
15 years 1 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
101
Voted
MKWI
2008
112views Business» more  MKWI 2008»
15 years 3 months ago
A Framework for Querying in Business Process Modelling
: In order to respond quickly to changing market requirements, a business organisation needs to increase the level of agility in all phases of the business process engineering chai...
Ivan Markovic, Alessandro Costa Pereira, Nenad Sto...
ICEBE
2009
IEEE
157views Business» more  ICEBE 2009»
14 years 11 months ago
Trust-Based Access Control for Privacy Protection in Collaborative Environment
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Min Li, Hua Wang, David Ross
120
Voted
SOCASE
2009
Springer
15 years 8 months ago
Business Modeling via Commitments
Abstract. Existing computer science approaches to business modeling offer lowstractions such as data and control flows, which fail to capture the business intent underlying the in...
Pankaj R. Telang, Munindar P. Singh
71
Voted
CAISE
2006
Springer
15 years 5 months ago
Experiences with Modeling and Verification of Regulations
Information system models commonly describe organizations in terms of the structure of the data they use, the organization of the processes they perform and the operations that wil...
Jan Vanthienen, Christophe Mues, Stijn Goedertier