Sciweavers

2022 search results - page 215 / 405
» Trust in Multi-Agent Systems
Sort
View
100
Voted
SIGECOM
1999
ACM
83views ECommerce» more  SIGECOM 1999»
15 years 5 months ago
Enhancing privacy and trust in electronic communities
A major impediment to using recommendation systems and collective knowledge for electronic commerce is the reluctance of individuals to reveal preferences in order to nd groups of...
Bernardo A. Huberman, Matthew K. Franklin, Tad Hog...
ACSAC
2004
IEEE
15 years 4 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
93
Voted
JCP
2006
135views more  JCP 2006»
15 years 19 days ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
DAC
2011
ACM
14 years 14 days ago
TPM-SIM: a framework for performance evaluation of trusted platform modules
This paper presents a simulation toolset for estimating the impact of Trusted Platform Modules (TPMs) on the performance of applications that use TPM services, especially in multi...
Jared Schmitz, Jason Loew, Jesse Elwell, Dmitry Po...
108
Voted
GRID
2005
Springer
15 years 6 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...