Sciweavers

1229 search results - page 38 / 246
» Trusted Computing
Sort
View
COMPUTER
2000
75views more  COMPUTER 2000»
14 years 11 months ago
Can You Trust Software Capability Evaluations?
Emilie O'Connell, Hossein Saiedian
COMPUTER
1998
50views more  COMPUTER 1998»
14 years 11 months ago
Providing Trusted Components to the Industry
Bertrand Meyer, Christine Mingins, Heinz W. Schmid...
POLICY
2007
Springer
15 years 6 months ago
A Socio-cognitive Approach to Modeling Policies in Open Environments
The richness of today’s electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current intera...
Tatyana Ryutov
APSCC
2008
IEEE
15 years 1 months ago
Understanding Cyber Trust Using a Triadic Functioning Analysis
Although social informatics has been a subject of systematic analytical and critical research for more than three decades, previous research has rarely noted the importance of soc...
Wen-Kung Lin, Chieh-Peng Lin, Chou-Kang Chiu
BIRTHDAY
2004
Springer
15 years 5 months ago
On the Formal Modelling of Trust in Reputation-Based Systems
In a reputation-based trust management system an entity’s behaviour determines its reputation which in turn affects other entities interaction with it. We present a mathematical...
Mogens Nielsen, Karl Krukow