Sciweavers

2846 search results - page 11 / 570
» Personalization of a Trust Network
Sort
View
TMC
2011
1105views more  TMC 2011»
14 years 4 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
TRUST
2009
Springer
15 years 4 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
ACMICEC
2006
ACM
142views ECommerce» more  ACMICEC 2006»
15 years 3 months ago
Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings
In electronic marketplaces populated by self-interested agents, buyer agents would benefit by modeling the reputation of seller agents, in order to make effective decisions abou...
Jie Zhang, Robin Cohen
SACMAT
2006
ACM
15 years 3 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
RECSYS
2009
ACM
15 years 4 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...