Sciweavers

1715 search results - page 192 / 343
» Trust and Reputation Systems
Sort
View
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
15 years 4 months ago
The Role of Virtual Distance in Innovation and Success
Although prior research has tended to dichotomize work teams as virtual or nonvirtual, most project teams today involve some mix of face-to-face and virtual interaction. We develo...
Karen Sobel Lojeski, Richard Reilly, Peter Dominic...
ETFA
2005
IEEE
15 years 3 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
SCAM
2005
IEEE
15 years 3 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
15 years 3 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern
DEXAW
2003
IEEE
98views Database» more  DEXAW 2003»
15 years 3 months ago
Amending P3P for Clearer Privacy Promises
The Platform for Privacy Preferences (P3P) can be a viable tool for organizations to clarify their privacy promises. In this paper, we summarize our experiences and describe some ...
Günter Karjoth, Matthias Schunter, Els Van He...