Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
Web-based environments typically span interactions between humans and software services. The management and automatic calculation of trust are among the key challenges of the futur...
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Agent based online auctions have not yet become popular because they are not trustable. One of the major concerns in agent based online auctions is the shilling behavior problem, w...