Sciweavers

1139 search results - page 19 / 228
» Trust Management Survey
Sort
View
ACISP
2000
Springer
15 years 4 months ago
PKI Seeks a Trusting Relationship
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
Audun Jøsang, Ingar Glenn Pedersen, Dean Po...
CCS
2006
ACM
15 years 3 months ago
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay a...
Luis F. G. Sarmenta, Marten van Dijk, Charles W. O...
HICSS
2000
IEEE
132views Biometrics» more  HICSS 2000»
15 years 4 months ago
The Impacts of Relational and Trust Development Training on Virtual Teams: An Exploratory Investigation
Virtual teams are becoming common place in many organizations. These teams are geographically distributed and communicate via computer-mediated communication systems. Two factors ...
Peggy M. Beranek
CIDR
2009
126views Algorithms» more  CIDR 2009»
15 years 26 days ago
Declarative Reconfigurable Trust Management
In recent years, there has been a proliferation of declarative logic-based trust management languages and systems proposed to ease the description, configuration, and enforcement ...
William R. Marczak, David Zook, Wenchao Zhou, Molh...
WICSA
2004
15 years 1 months ago
PACE: An Architectural Style for Trust Management in Decentralized Applications
Distributed applications that lack a central, trustworthy authority for control and validation are properly termed decentralized. Multiple, independent agencies, or "partners...
Girish Suryanarayana, Justin R. Erenkrantz, Scott ...