Sciweavers

3299 search results - page 101 / 660
» Privacy and Trusted Computing
Sort
View
CNSR
2006
IEEE
15 years 10 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward
PUC
2000
70views more  PUC 2000»
15 years 4 months ago
Mobile Computers in a Community NHS Trust: Is this a Relevant Context and Environment for their Use?
This paper describes a case study in which mobile computers were used by a UK NHS Trust. The intention was to give clinicians access to up to date patient data enabling them to be...
Barbara McManus
IAT
2007
IEEE
15 years 10 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
DBISP2P
2003
Springer
76views Database» more  DBISP2P 2003»
15 years 9 months ago
Trust-Aware Delivery of Composite Goods
Abstract. The vast majority of the interactions in typical online communities nowadays is between complete strangers. In such settings reputation reporting and trust management mod...
Magdalena Punceva, Karl Aberer
FMCO
2006
Springer
15 years 8 months ago
Towards a Formal Framework for Computational Trust
d Abstract) Vladimiro Sassone1 , Karl Krukow2 , and Mogens Nielsen2 1 ECS, University of Southampton 2 BRICS , University of Aarhus We define a mathematical measure for the quantit...
Vladimiro Sassone, Karl Krukow, Mogens Nielsen