Sciweavers

1229 search results - page 84 / 246
» Trusted Computing
Sort
View
CSCWD
2005
Springer
15 years 3 months ago
Supporting peer-to-peer collaboration through trust
Distributed systems generally require their component parts to interact cooperatively, in order for the system as a whole to function effectively. For any given activity, several ...
Nathan Griffiths, Shanghua Sun
SIGKDD
2008
138views more  SIGKDD 2008»
14 years 9 months ago
PinKDD'08: privacy, security, and trust in KDD post workshop report
This report summarizes the events of the 2nd International Workshop on Privacy, Security, and Trust in KDD, at the 14th ACM SIGKDD International Conference on Knowledge Discovery ...
Francesco Bonchi, Elena Ferrari, Wei Jiang, Bradle...
CSE
2009
IEEE
15 years 4 months ago
Surfing a Web of Trust: Reputation and Reciprocity on CouchSurfing.com
—Reputation mechanisms are essential for online transactions, where the parties have little prior experience with one another. This is especially true when transactions result in...
Debra Lauterbach, Hung Truong, Tanuj Shah, Lada A....
DASC
2006
IEEE
15 years 4 months ago
DRBTS: Distributed Reputation-based Beacon Trust System
Abstract— Wireless Sensor Networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations where accurate location of sensors i...
Avinash Srinivasan, Joshua Teitelbaum, Jie Wu
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 3 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...