Sciweavers

446 search results - page 18 / 90
» Modeling trust in e-commerce: an approach based on user requ...
Sort
View
ITRUST
2004
Springer
15 years 5 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
ATAL
2008
Springer
15 years 1 months ago
Towards Improved Partner Selection Using Recommendations and Trust
Agents in open and dynamic environments face the challenge of uncertainty while interacting with others to achieve their goals. They face quick and unforeseen changes to the behavi...
Sarah N. Lim Choi Keung, Nathan Griffiths
P2P
2003
IEEE
15 years 5 months ago
Establishing Trust in Distributed Storage Providers
— Corporate IT as well as individuals show increasing interest in reliable outsourcing of storage infrastructure. Decentralized solutions with their resilience against partial ou...
Germano Caronni, Marcel Waldvogel
ICICS
2005
Springer
15 years 5 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
ICSR
2004
Springer
15 years 5 months ago
A Metamodel-Based Approach for the Dynamic Reconfiguration of Component-Based Software
Non-stop and highly available applications need to be dynamically adapted to new conditions in their execution environment, to new user requirements or to some situations usually u...
Abdelmadjid Ketfi, Noureddine Belkhatir