Sciweavers

2846 search results - page 70 / 570
» Personalization of a Trust Network
Sort
View
106
Voted
ATAL
2007
Springer
15 years 9 hour ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh
ICC
2008
IEEE
133views Communications» more  ICC 2008»
15 years 4 months ago
A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks
—The recent surge of peer-to-peer (P2P) networks consisting of thousands of of hosts makes them a breeding ground for malware proliferation. Although some existing studies have s...
Xuhua Ding, Wei Yu, Ying Pan
85
Voted
PDCAT
2005
Springer
15 years 3 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
HICSS
2002
IEEE
148views Biometrics» more  HICSS 2002»
15 years 3 months ago
Barriers to a Wide-Area Trusted Network Early Warning System for Electric Power Disturbances
It is apparent that perturbations of the North American electric power grid follow the patterns and characteristics of Self Organized Critical (SOC) systems. Published studies sho...
Paul W. Oman, Jeff Roberts
80
Voted
INTERACT
2003
14 years 11 months ago
Human and Humanoid Don't Match: Consistency Preference and Impact on Users' Trust
Abstract: For many anthropomorphic representations on computer interfaces, there are choices of using mediacaptured human components and using computer-synthesized humanoid counter...
Li Gong