Sciweavers

3299 search results - page 133 / 660
» Privacy and Trusted Computing
Sort
View
ICDCS
2007
IEEE
15 years 11 months ago
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By t...
Anna Cinzia Squicciarini, Alberto Trombetta, Elisa...
CIMCA
2006
IEEE
15 years 10 months ago
Assessing and Assuring Trust in E-Commerce Systems
On-line trading or Internet Commerce restoring to ECommerce systems are gradually replacing the traditional commerce activities. Internet users must have reasonable faith on the u...
Zhongwei Zhang, Zhen Wang
129
Voted
HCI
2009
15 years 2 months ago
Trust in Online Technology: Towards Practical Guidelines Based on Experimentally Verified Theory
Abstract. A large amount of research attempts to define trust, yet relatively little research attempts to experimentally verify what makes trust needed in interactions with humans ...
Christian Detweiler, Joost Broekens
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
16 years 6 months ago
SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services
In a mobile service scenario, users query a server for nearby points of interest but they may not want to disclose their locations to the service. Intuitively, location privacy may...
Man Lung Yiu, Christian S. Jensen, Xuegang Huang, ...
IEEESP
2010
101views more  IEEESP 2010»
15 years 3 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato