Sciweavers

1715 search results - page 226 / 343
» Trust and Reputation Systems
Sort
View
SIGMOD
2008
ACM
222views Database» more  SIGMOD 2008»
15 years 10 months ago
Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks
This demo presents a privacy-preserving aggregate location monitoring system, namely, TinyCasper, in which we can monitor moving objects in wireless sensor networks while preservi...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
SAC
2005
ACM
15 years 3 months ago
A trust-enhanced recommender system application: Moleskiing
Recommender Systems (RS) suggests to users items they will like based on their past opinions. Collaborative Filtering (CF) is the most used technique to assess user similarity bet...
Paolo Avesani, Paolo Massa, Roberto Tiella
SDMW
2007
Springer
15 years 4 months ago
Requirements of Secure Storage Systems for Healthcare Records
Recent compliance regulations are intended to foster and restore human trust in digital information records and, more broadly, in our businesses, hospitals, and educational enterpr...
Ragib Hasan, Marianne Winslett, Radu Sion
FC
1997
Springer
107views Cryptology» more  FC 1997»
15 years 1 months ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko
PUC
2006
72views more  PUC 2006»
14 years 10 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon