Sciweavers

947 search results - page 137 / 190
» HMM-Based Trust Model
Sort
View
110
Voted
POLICY
2007
Springer
15 years 6 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
RE
2007
Springer
15 years 6 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
103
Voted
TRUSTBUS
2007
Springer
15 years 6 months ago
Recognition of Authority in Virtual Organisations
Abstract. A Virtual Organisation (VO) is a temporary alliance of autonomous, diverse, and geographically dispersed organisations, where the participants pool resources, information...
Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser
WETICE
2005
IEEE
15 years 6 months ago
Transparent Remote File Access in the Minimum Intrusion Grid
This paper describes the implementation of a thin user-level layer to be installed on Grid resources. The layer fits in the Minimum intrusion Grid design by imposing as few requi...
Rasmus Andersen, Brian Vinter
ATAL
2004
Springer
15 years 6 months ago
Temptation and Contribution in C2C Transactions: Implications for Designing Reputation Management Systems
: A reputation management system can promote trust in transactions in an online consumer-to-consumer (C2C) market. We model a C2C market by employing an agent-based approach. To di...
Hitoshi Yamamoto, Kazunari Ishida, Toshizumi Ohta