Sciweavers

3299 search results - page 5 / 660
» Privacy and Trusted Computing
Sort
View
CACM
2005
64views more  CACM 2005»
14 years 9 months ago
Privacy and trust issues with invisible computers
Saadi Lahlou, Marc Langheinrich, Carsten Röck...
99
Voted
COMPSAC
2006
IEEE
15 years 3 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
ACSAC
2002
IEEE
15 years 2 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
AGENTS
2000
Springer
15 years 1 months ago
The Socio-cognitive Dynamics of Trust: Does Trust Create Trust?
We will examine in this paper three crucial aspects of trust dynamics: a) How A’s trusting B and relying on it in situation can actually (objectively) influence B’s trustworth...
Rino Falcone, Cristiano Castelfranchi
JTAER
2010
109views more  JTAER 2010»
14 years 8 months ago
A Flexible Architecture for Privacy-Aware Trust Management
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different pa...
Klemens Böhm, Sandro Etalle, Jerry den Hartog...