Sciweavers

1117 search results - page 99 / 224
» A Compliance Model of Trust
Sort
View
LATINCRYPT
2010
15 years 10 days ago
Broadcast Encryption with Multiple Trust Authorities
Abstract. In this paper we extend the notion of hierarchical identitybased encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with mul...
Kent D. Boklan, Alexander W. Dent, Christopher A. ...
ICLP
2007
Springer
15 years 8 months ago
Core TuLiP Logic Programming for Trust Management
We propose CoreTuLiP - the core of a trust management language based on Logic Programming. CoreTuLiP is based on a subset of moded logic programming, but enjoys the features of TM ...
Marcin Czenko, Sandro Etalle
ICAC
2005
IEEE
15 years 7 months ago
Self-Adjusting Trust and Selection for Web Services
Service-oriented architectures enable services to be dynamically selected and integrated at runtime, thus enabling system flexibility and adaptiveness—autonomic attributes that...
E. Michael Maximilien, Munindar P. Singh
ATAL
2005
Springer
15 years 7 months ago
Trusted kernel-based coalition formation
We define Trusted Kernel-based Coalition Formation as a novel extension to the traditional kernel-based coalition formation process which ensures agents choose the most reliable ...
Bastian Blankenburg, Rajdeep K. Dash, Sarvapali D....
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
15 years 7 months ago
SME E-Procurement Adoption in Hong Kong - The Roles of Power, Trust and Value
The objective of this research is to test a model of electronic procurement (e-procurement) adoption behavior by Small- to Medium-sized Enterprises (SME). We investigate the pheno...
Joyce K. Y. Chan, Matthew K. O. Lee