-
1
-
-
14544292118
-
Privacy and Trust Issues with Invisible Computers
-
Lahlou, S., Langheinrich, M., Röcker, C.: Privacy and Trust Issues with Invisible Computers. Communications of ACM 48(3), 59-60 (2005)
-
(2005)
Communications of ACM
, vol.48
, Issue.3
, pp. 59-60
-
-
Lahlou, S.1
Langheinrich, M.2
Röcker, C.3
-
4
-
-
38349030351
-
-
Jøsang, A., Keser, C., Dimitrakos, T.: Can We Manage Trust? In: iTrust, the Proceedings of the Third International Conference on Trust Management (2005)
-
Jøsang, A., Keser, C., Dimitrakos, T.: Can We Manage Trust? In: iTrust, the Proceedings of the Third International Conference on Trust Management (2005)
-
-
-
-
5
-
-
0029700344
-
Decentralized Trust management
-
Blaze, M, Feigenbaum, J, Lacy, J, eds, Oakland, CA May
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust management. In: Blaze, M., Feigenbaum, J., Lacy, J. (eds.) IEEE Conference on Security and Privacy, Oakland, CA (May 1996)
-
(1996)
IEEE Conference on Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
6
-
-
55849093822
-
Trust Requirements in Identity Management
-
Newcastle, Australia January-February
-
Jøsang, A., Fabre, J., Hay, B., Dalziel, J., Pope, S.: Trust Requirements in Identity Management. In: Australasian Information Security Workshop 2005, Newcastle, Australia (January-February 2005)
-
(2005)
Australasian Information Security Workshop
-
-
Jøsang, A.1
Fabre, J.2
Hay, B.3
Dalziel, J.4
Pope, S.5
-
7
-
-
38349034845
-
Enhancing P3P Framework through Policies and Trust
-
TR-CS-04-13 September, Available at
-
Kolari, P., et al.: Enhancing P3P Framework through Policies and Trust. UMBC Technical Report, TR-CS-04-13 (September 2004), Available at http://ebiquity.umbc.edu/get/a/publication/118.pdf
-
(2004)
UMBC Technical Report
-
-
Kolari, P.1
-
8
-
-
38349035055
-
-
Available at
-
Trust and Safety in eBay, Available at: http://pages.ebay.com/help/ newtoebay/resolving-concerns.html
-
Trust and Safety in eBay
-
-
-
9
-
-
33750107060
-
Supporting Context-aware Mobile Applications: An Infrastructure Approach
-
van Sinderen, M.J., van Halteren, A.T., Wegdam, M., Meeuwissen, H.B., Eertink, E.H.: Supporting Context-aware Mobile Applications: an Infrastructure Approach. IEEE Communication Magazine (September 2006)
-
(2006)
IEEE Communication Magazine (September
-
-
van Sinderen, M.J.1
van Halteren, A.T.2
Wegdam, M.3
Meeuwissen, H.B.4
Eertink, E.H.5
-
10
-
-
16444368611
-
Privacy in E-Commerce: Stated Preferences vs. Actual Behavior
-
Berendt, B., Günther, O., Spiekermann, S.: Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communication of the ACM (CACM) 48(3) (2005)
-
(2005)
Communication of the ACM (CACM)
, vol.48
, Issue.3
-
-
Berendt, B.1
Günther, O.2
Spiekermann, S.3
-
13
-
-
33845266735
-
-
Neisse, R., Wegdam, M., van Sinderen, M.J.: Context-Aware Trust Domains. In: Havinga, P., Lijding, M., Meratnia, N., Wegdam, M. (eds.) EuroSSC 2006. LNCS, 4272, pp. 234-237. Springer, Heidelberg (2006)
-
Neisse, R., Wegdam, M., van Sinderen, M.J.: Context-Aware Trust Domains. In: Havinga, P., Lijding, M., Meratnia, N., Wegdam, M. (eds.) EuroSSC 2006. LNCS, vol. 4272, pp. 234-237. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
84903639072
-
Trust in Mobile Context Aware Systems
-
Cairo, Egypt
-
Daskapan, S., Ali Eldin, A., Wagenaar, R.: Trust in Mobile Context Aware Systems. In: 5th IBIMA. International Business Information Management Conference, Cairo, Egypt (2005)
-
(2005)
5th IBIMA. International Business Information Management Conference
-
-
Daskapan, S.1
Ali Eldin, A.2
Wagenaar, R.3
-
15
-
-
33747182521
-
Biometric marketing: Targeting the online consumer
-
Pons, A.: Biometric marketing: targeting the online consumer. Communications of ACM Magazine 49(8), 61-65 (2006)
-
(2006)
Communications of ACM Magazine
, vol.49
, Issue.8
, pp. 61-65
-
-
Pons, A.1
-
18
-
-
33845424568
-
Trust Meta-Policies for Flexible and Dynamic Policy Based Trust Management
-
Canada June
-
Quinn, K., O'Sullivan, D., Lewis, D., Wade, V.P.: Trust Meta-Policies for Flexible and Dynamic Policy Based Trust Management. In: POLICY 2006, Canada (June 2006)
-
(2006)
POLICY
-
-
Quinn, K.1
O'Sullivan, D.2
Lewis, D.3
Wade, V.P.4
-
19
-
-
34447127497
-
A Pervasive Trust Management Model for Dynamic Open Environments
-
Boston, USA
-
Almenárez, F., Marín, A., Campo, C., García, C.R.: A Pervasive Trust Management Model for Dynamic Open Environments. In: First Workshop on Pervasive Security and Trust in MobiQuitous, Boston, USA (2004)
-
(2004)
First Workshop on Pervasive Security and Trust in MobiQuitous
-
-
Almenárez, F.1
Marín, A.2
Campo, C.3
García, C.R.4
-
20
-
-
38349032685
-
Context-aware Trustworthiness Evaluation with Indirect Knowledge
-
Athens, USA
-
Toivonen, S., Lenzini, G., Uusitalo, I.: Context-aware Trustworthiness Evaluation with Indirect Knowledge. In: SWPW 2006. proc. 2nd International Semantic Web Policy Workshop, Athens, USA (2006)
-
(2006)
SWPW 2006. proc. 2nd International Semantic Web Policy Workshop
-
-
Toivonen, S.1
Lenzini, G.2
Uusitalo, I.3
-
21
-
-
0042495505
-
An Integrative Model of Organizational Trust
-
Mayer, R.C, Davis, J.H, Schoorman, D.F.: An Integrative Model of Organizational Trust. The Academy of Management Review 20(3), 709-734 (1995)
-
(1995)
The Academy of Management Review
, vol.20
, Issue.3
, pp. 709-734
-
-
Mayer, R.C.1
Davis, J.H.2
Schoorman, D.F.3
-
22
-
-
35248826597
-
-
Grandinson, T., Sloman, M.: Trust Management Tools for Internet Applications. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, 2692, Springer, Heidelberg (2003)
-
Grandinson, T., Sloman, M.: Trust Management Tools for Internet Applications. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, Springer, Heidelberg (2003)
-
-
-
-
23
-
-
38349024478
-
-
Liberty Identity Federation Framework Architecture Overview, Version 1.2, Liberty Alliance Project. Available at
-
Liberty Identity Federation Framework Architecture Overview, Version 1.2, Liberty Alliance Project. Available at: https://www.projectliberty.org/ resources/
-
-
-
-
24
-
-
62949150088
-
The Impact of Context on the Trustworthiness of Communication: An Ontological Approach
-
Japan November
-
rd ISWC, Japan (November 2004)
-
(2004)
rd ISWC
-
-
Toivonen, S.1
Denker, G.2
-
25
-
-
62949144446
-
Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems
-
Edinburgh, Scotland
-
Toivonen, S., Lenzini, G., Uusitalo, I.: Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems. In: MTW 2006. Workshop on Models of Trust for the Web MTW 2006, Edinburgh, Scotland (2006)
-
(2006)
MTW 2006. Workshop on Models of Trust for the Web MTW
-
-
Toivonen, S.1
Lenzini, G.2
Uusitalo, I.3
-
26
-
-
30744448197
-
Context sensitive access control
-
Stockholm, Sweden June
-
Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W., Reitsma, J.: Context sensitive access control. In: SACMAT 2005, Stockholm, Sweden (June 2005)
-
(2005)
SACMAT
-
-
Hulsebosch, R.J.1
Salden, A.H.2
Bargh, M.S.3
Ebben, P.W.4
Reitsma, J.5
|