Sciweavers

555 search results - page 46 / 111
» Anonymous Webs of Trust
Sort
View
ICDM
2007
IEEE
101views Data Mining» more  ICDM 2007»
15 years 4 months ago
Lightweight Distributed Trust Propagation
Using mobile devices, such as smart phones, people may create and distribute different types of digital content (e.g., photos, videos). One of the problems is that digital content...
Daniele Quercia, Stephen Hailes, Licia Capra
CHI
2003
ACM
15 years 3 months ago
Prominence-interpretation theory: explaining how people assess credibility online
Four years of research has led to a theory that describes how people assess the credibility of Web sites. This theory proposes that users notice and interpret various Web site ele...
B. J. Fogg
WWW
2002
ACM
15 years 10 months ago
Certified email with a light on-line trusted third party: design and implementation
This paper presents a new protocol for certified email. The protocol aims to combine security, scalability, easy implementation, and viable deployment. The protocol relies on a li...
Martín Abadi, Neal Glew
COMPSAC
2008
IEEE
15 years 4 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
ICWS
2004
IEEE
14 years 11 months ago
Access Control for Semantic Web Services
In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web serv...
Sudhir Agarwal, Barbara Sprick