The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
The growth of business-to-business e-commerce has highlighted the role of computer and communications technologies as well as inter-organizational trust in developing and maintain...
Based on our recent work on the development of a trust model for recommender agents and a qualitative survey, we explore the potential of building users’ trust with explanation ...
It is well understood that using a software component methodology can simplify the development and maintenance of systems. Web services allow this vision to be extended allowing c...
Every time a user uses the Internet, a wealth of personal information is revealed, either voluntarily or involuntarily. This often causes privacy breaches, specially if the informa...