Sciweavers

2022 search results - page 358 / 405
» Trust in Multi-Agent Systems
Sort
View
ICSE
2007
IEEE-ACM
15 years 10 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
CSCW
2010
ACM
15 years 6 months ago
Perceptions of trustworthiness online: the role of visual and textual information
People increasingly rely on social networking websites to initiate personal and professional relationships. This requires that a considerable amount of trust be placed in stranger...
Catalina L. Toma
HICSS
2010
IEEE
172views Biometrics» more  HICSS 2010»
15 years 4 months ago
Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA
Worldwide social networks, like Facebook, face fierce competition from local platforms when expanding globally. To remain attractive social network providers need to encourage use...
Hanna Krasnova, Natasha F. Veltri
SAC
2010
ACM
15 years 4 months ago
Content cloaking: preserving privacy with Google Docs and other web applications
Web office suites such as Google Docs offer unparalleled collaboration experiences in terms of low software requirements, ease of use, data ubiquity, and availability. When the d...
Gabriele D'Angelo, Fabio Vitali, Stefano Zacchirol...
ACSAC
2009
IEEE
15 years 4 months ago
HIMA: A Hypervisor-Based Integrity Measurement Agent
Abstract—Integrity measurement is a key issue in building trust in distributed systems. A good solution to integrity measurement has to provide both strong isolation between the ...
Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan ...