Sciweavers

3299 search results - page 138 / 660
» Privacy and Trusted Computing
Sort
View
127
Voted
ICIS
2000
15 years 6 months ago
Trading partner trust in electronic commerce participation
The growth of business-to-business e-commerce has highlighted the role of computer and communications technologies as well as inter-organizational trust in developing and maintain...
Pauline Ratnasingham, Kuldeep Kumar
67
Voted
COMPUTER
2007
44views more  COMPUTER 2007»
15 years 4 months ago
Privacy-Preserving Data Mining Systems
Nan Zhang 0004, Wei Zhao
ATAL
2008
Springer
15 years 6 months ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
ICYCS
2008
IEEE
15 years 11 months ago
A Trust-Enabling Support for Goal-Based Services
Service-Oriented Computing allows new applications to be developed by using and/or combining services offered by different providers. In several cases a service needs sensitive in...
Luiz Olavo Bonino da Silva Santos, Luís Fer...
132
Voted
CSE
2009
IEEE
15 years 11 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...