Sciweavers

2846 search results - page 44 / 570
» Personalization of a Trust Network
Sort
View
WECWIS
2005
IEEE
87views ECommerce» more  WECWIS 2005»
15 years 3 months ago
TrustDavis: A Non-Exploitable Online Reputation System
We present TrustDavis, an online reputation system that provides insurance against trade fraud by leveraging existing relationships between players, such as the ones present in so...
Dimitri do B. DeFigueiredo, Earl T. Barr
WPES
2003
ACM
15 years 3 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
IWNAS
2008
IEEE
15 years 4 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
ICPPW
2003
IEEE
15 years 3 months ago
Trusting Routers and Relays in Ad hoc Networks
The current generation of ad hoc networks relies on other nodes in the network for routing information and for routing the packets. These networks are based on the fundamental ass...
Prashant Dewan, Partha Dasgupta
CCS
2004
ACM
15 years 3 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...