Sciweavers

422 search results - page 29 / 85
» Walking the Web of Trust
Sort
View
WWW
2002
ACM
16 years 16 days ago
Certified email with a light on-line trusted third party: design and implementation
This paper presents a new protocol for certified email. The protocol aims to combine security, scalability, easy implementation, and viable deployment. The protocol relies on a li...
Martín Abadi, Neal Glew
COMPSAC
2008
IEEE
15 years 6 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
ICWS
2004
IEEE
15 years 1 months ago
Access Control for Semantic Web Services
In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web serv...
Sudhir Agarwal, Barbara Sprick
ICONIP
2009
14 years 9 months ago
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites
In this paper, we present an approach that aims to study users' past trust decisions (PTDs) for improving the accuracy of detecting phishing sites. Generally, Web users requir...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
COLCOM
2007
IEEE
15 years 6 months ago
Modeling trust in collaborative information systems
—Collaborative systems available on the Web allow millions of users to share information through a growing collection of tools and platforms such as wikis, blogs and shared forum...
Sara Javanmardi, Cristina Videira Lopes