Sciweavers

989 search results - page 79 / 198
» An information-based model for trust
Sort
View
IAT
2010
IEEE
14 years 9 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
IMCSIT
2010
14 years 9 months ago
Trusted Data in IBM's MDM: Accuracy Dimension
A good data model designed for e-Commerce or e-Government has little value if it lacks accurate, up-to-date data [22]. In this paper data quality measures, its processing and maint...
Przemyslaw Pawluk
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 4 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
WINE
2009
Springer
151views Economy» more  WINE 2009»
15 years 3 months ago
Consistent Continuous Trust-Based Recommendation Systems
Abstract. The goal of a trust-based recommendation system is to generate personalized recommendations from known opinions and trust relationships. Prior work introduced the axiomat...
Ola Rozenfeld, Moshe Tennenholtz
ACSAC
2004
IEEE
15 years 2 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...