Sciweavers

989 search results - page 115 / 198
» An information-based model for trust
Sort
View
UM
2007
Springer
15 years 5 months ago
To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications
User’s privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model wh...
Giuseppe Lugano, Pertti Saariluoma
BPM
2003
Springer
75views Business» more  BPM 2003»
15 years 4 months ago
Security in Business Process Engineering
We present a general methodology for integrating arbitrary security requirements in the development of business processes in a both elegant and rigorous way. We show how trust rela...
Michael Backes, Birgit Pfitzmann, Michael Waidner
FMCO
2007
Springer
124views Formal Methods» more  FMCO 2007»
15 years 3 months ago
Certification Using the Mobius Base Logic
This paper describes a core component of Mobius' Trusted Code Base, the Mobius base logic. This program logic facilitates the transmission of certificates that are generated u...
Lennart Beringer, Martin Hofmann, Mariela Pavlova
83
Voted
GECCO
2010
Springer
180views Optimization» more  GECCO 2010»
15 years 2 months ago
Comparison of NEWUOA with different numbers of interpolation points on the BBOB noisy testbed
In this paper, we study the performances of the NEW Unconstrained Optimization Algorithm (NEWUOA) with different numbers of interpolation points. NEWUOA is a trust region method, ...
Raymond Ros
AISM
2004
15 years 15 days ago
PKI - Advantages and Obstacles
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
A. Jancic, Matthew J. Warren