Sciweavers

1715 search results - page 256 / 343
» Trust and Reputation Systems
Sort
View
POLICY
2009
Springer
15 years 4 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
WIKIS
2009
ACM
15 years 4 months ago
Wiki credibility enhancement
Wikipedia has been very successful as an open encyclopedia which is editable by anybody. However, the anonymous nature of Wikipedia means that readers may have less trust since th...
Felix Halim, Yongzheng Wu, Roland H. C. Yap
CSFW
2008
IEEE
15 years 4 months ago
DKAL: Distributed-Knowledge Authorization Language
DKAL is a new declarative authorization language for distributed systems. It is based on existential fixed-point logic and is considerably more expressive than existing authoriza...
Yuri Gurevich, Itay Neeman
DEPCOS
2008
IEEE
96views Hardware» more  DEPCOS 2008»
15 years 4 months ago
Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application
Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is sp...
Lukasz Cyra, Janusz Górski
HICSS
2008
IEEE
103views Biometrics» more  HICSS 2008»
15 years 4 months ago
Great Scrums Need Great Product Owners: Unbounded Collaboration and Collective Product Ownership
Scrum describes a separation of roles; the product owner is accountable for achieving business objectives and the team for technical execution. A pragmatic and collegial relations...
Ken H. Judy, Ilio Krumins-Beens