Sciweavers

947 search results - page 71 / 190
» HMM-Based Trust Model
Sort
View
119
Voted
TPDS
2008
116views more  TPDS 2008»
15 years 21 days ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
112
Voted
ICEBE
2009
IEEE
157views Business» more  ICEBE 2009»
14 years 10 months ago
Trust-Based Access Control for Privacy Protection in Collaborative Environment
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Min Li, Hua Wang, David Ross
111
Voted
FIMH
2007
Springer
15 years 7 months ago
Can We Trust the Transgenic Mouse? Insights from Computer Simulations
Abstract. Over the past several decades, the mouse has gained prominence in the cardiac electrophysiology literature as the animal model of choice. Using computer models of the mou...
Joseph Tranquillo, Adhira Sunkara
100
Voted
WOA
2004
15 years 2 months ago
Customer information sharing between e-commerce applications
The management of one-to-one business interaction is challenged by the latency in the acquisition of information about the individual customer's preferences. Although sharing ...
Barbara Negro, Angelo Difino, Fabio Bellifemine, G...
117
Voted
IJWIS
2007
153views more  IJWIS 2007»
15 years 21 days ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...