Sciweavers

2846 search results - page 56 / 570
» Personalization of a Trust Network
Sort
View
SACMAT
2009
ACM
15 years 4 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
WINE
2009
Springer
151views Economy» more  WINE 2009»
15 years 2 months ago
Consistent Continuous Trust-Based Recommendation Systems
Abstract. The goal of a trust-based recommendation system is to generate personalized recommendations from known opinions and trust relationships. Prior work introduced the axiomat...
Ola Rozenfeld, Moshe Tennenholtz
SIGIR
2008
ACM
14 years 10 months ago
Efficient top-k querying over social-tagging networks
Online communities have become popular for publishing and searching content, as well as for finding and connecting to other users. User-generated content includes, for example, pe...
Ralf Schenkel, Tom Crecelius, Mouna Kacimi, Sebast...
LCN
2003
IEEE
15 years 3 months ago
Secure and Manageable Virtual Private Networks for End-users
This paper presents personal networks, which integrate a VPN and the per-VPN execution environments of the hosts included in the VPN. The key point is that each execution environm...
Kenichi Kourai, Toshio Hirotsu, Koji Sato, Osamu A...
IJISEC
2007
119views more  IJISEC 2007»
14 years 10 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny