Sciweavers

446 search results - page 15 / 90
» Modeling trust in e-commerce: an approach based on user requ...
Sort
View
CAISE
2006
Springer
15 years 3 months ago
Enhancing trust and buy-in from business: a platform for business -driven development of B2B transactions
A measure for the quality of software is the extent to which it corresponds to the business objectives and requirements it was designed for. The earlier those who elicit the requir...
Michael Schmitt, Bertrand Grégoire, Stefan ...
CCS
2009
ACM
15 years 6 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
JASIS
2006
108views more  JASIS 2006»
14 years 12 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...
IEEEARES
2007
IEEE
15 years 6 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
OTM
2005
Springer
15 years 5 months ago
QoS-Based Service Selection and Ranking with Trust and Reputation Management
Abstract. QoS-based service selection mechanisms will play an essential role in service-oriented architectures, as e-Business applications want to use services that most accurately...
Le-Hung Vu, Manfred Hauswirth, Karl Aberer