Sciweavers

3299 search results - page 132 / 660
» Privacy and Trusted Computing
Sort
View
177
Voted
TMC
2008
159views more  TMC 2008»
15 years 3 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
SIGOPSE
2004
ACM
15 years 10 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
PERCOM
2009
ACM
16 years 5 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
CHI
2003
ACM
16 years 5 months ago
Interpersonal cues and consumer trust in e-commerce
E-commerce stretches interactions over space and time, and thus requires more trust than traditional shopping. Current approaches to building trust in e-commerce focus on cognitiv...
Jens Riegelsberger
CSE
2009
IEEE
15 years 11 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...