Sciweavers

730 search results - page 27 / 146
» Modeling trust in collaborative information systems
Sort
View
157
Voted
WPES
2003
ACM
15 years 9 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
176
Voted
SIGIR
2012
ACM
13 years 6 months ago
Building reputation and trust using federated search and opinion mining
The term online reputation addresses trust relationships amongst agents in dynamic open systems. These can appear as ratings, recommendations, referrals and feedback. Several repu...
Somayeh Khatiban
139
Voted
EEMMAS
2007
Springer
15 years 10 months ago
Environment Support to the Management of Context Awareness Information
Abstract. Collaborative Ubiquitous Environments (CUEs) are environments supporting collaboration among persons in a ubiquitous computing setting. This paper shows how results of th...
Marco P. Locatelli, Giuseppe Vizzari
118
Voted
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 10 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
141
Voted
SACMAT
2005
ACM
15 years 9 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang