Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
In this paper we develop a novel probabilistic model of computational trust that allows agents to exchange and combine reputation reports over heterogeneous, correlated multi-dime...
Steven Reece, Stephen Roberts, Alex Rogers, Nichol...
Trust is a sine qua non for trade. According to transaction cost economics, a contract always offers some opportunity to defect. In the case of asymmetric product information, wher...
Gert Jan Hofstede, Catholijn M. Jonker, Tim Verwaa...
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...