Sciweavers

2846 search results - page 29 / 570
» Personalization of a Trust Network
Sort
View
ENTCS
2007
92views more  ENTCS 2007»
14 years 10 months ago
The MoR-Trust Distributed Trust Management System: Design and Simulation Results
MoR-Trust is a purely decentralized peer-to-peer trust management system, targeted towards networks and applications supporting transactions or collaborations of a quantitative na...
Stephanos Androutsellis-Theotokis, Diomidis Spinel...
SEMWEB
2004
Springer
15 years 3 months ago
The Impact of Context on the Trustworthiness of Communication: An Ontological Approach
We outline a Semantic Web approach for considering the impact of context information on the trustworthiness of communication. We show that the contexts of message sender, receiver,...
Santtu Toivonen, Grit Denker
ICDCSW
2003
IEEE
15 years 3 months ago
Survivable Multi-Level Ad-Hoc Group Operations
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishin...
Dan Zhou, Jie Wu
CCS
2007
ACM
15 years 2 months ago
Offline untrusted storage with immediate detection of forking and replay attacks
We address the problem of using an untrusted server with only a trusted timestamping device (TTD) to provide trusted storage for a large number of clients, where each client may o...
Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarme...
WWW
2009
ACM
15 years 10 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...