Sciweavers

1715 search results - page 153 / 343
» Trust and Reputation Systems
Sort
View
ESSOS
2009
Springer
16 years 5 days ago
Idea: Trusted Emergency Management
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency i...
Timothy E. Levin, Cynthia E. Irvine, Terry Benzel,...
ISPEC
2007
Springer
15 years 11 months ago
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do no...
Yanjiang Yang, Robert H. Deng, Feng Bao
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
15 years 10 months ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu
SIGECOM
1999
ACM
83views ECommerce» more  SIGECOM 1999»
15 years 9 months ago
Enhancing privacy and trust in electronic communities
A major impediment to using recommendation systems and collective knowledge for electronic commerce is the reluctance of individuals to reveal preferences in order to nd groups of...
Bernardo A. Huberman, Matthew K. Franklin, Tad Hog...
ACSAC
2004
IEEE
15 years 9 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...