Sciweavers

3299 search results - page 157 / 660
» Privacy and Trusted Computing
Sort
View
PST
2004
15 years 6 months ago
Familiarity and Trust: Measuring Familiarity with a Web Site
Abstract-- This work aims at measuring familiarity to contribute to the formalization of trust. Trust has always been bundled with familiarity to become a popular topic in the area...
Jie Zhang, Ali A. Ghorbani
AIEDAM
2004
77views more  AIEDAM 2004»
15 years 4 months ago
The role of trust in distributed design
Automated support of design teams, consisting of both human and automated systems, requires an understanding of the role of trust in distributed design processes. By explicitating ...
Niek J. E. Wijngaards, Hidde M. Boonstra, Frances ...
135
Voted
IEEESCC
2005
IEEE
15 years 10 months ago
Designing Privacy Policies for Adopting RFID in the Retail Industry
Radio Frequency Identification (RFID) technologies can potentially improve the productivity of retailers. In this paper, we propose a role-based, enterprise-level, RFID-oriented p...
Haifei Li, Patrick C. K. Hung, Jia Zhang, David Ah...
CSCWD
2009
Springer
15 years 8 months ago
Privacy preserving on Radio Frequency Identification systems
This paper focuses on the challenges on the privacy of Radio Frequency Identification (RFID) systems. RFID systems have already widely applied in industry and have been bringing l...
Hua Wang, Lili Sun, Jianming Yong, Yongbing Zhang
CCS
2009
ACM
15 years 11 months ago
Inferring privacy policies for social networking services
Social networking sites have come under criticism for their poor privacy protection track record. Yet, there is an inherent difficulty in deciding which principals should have acc...
George Danezis