-
1
-
-
52249096166
-
Getting more from reputation systems: A context-aware reputation framework based on trust centers and agent lists
-
Greece. Washington, DC: IEEE Computer Society Press
-
Alnemr, R., & Meinel, C. (2008). Getting more from reputation systems: A context-aware reputation framework based on trust centers and agent lists. In The Third International Multi-Conference on Computing in the Global Information Technology (pp. 137-142), Greece. Washington, DC: IEEE Computer Society Press.
-
(2008)
The Third International Multi-Conference on Computing in the Global Information Technology
, pp. 137-142
-
-
Alnemr, R.1
Meinel, C.2
-
3
-
-
34249798492
-
An integration of reputationbased and policy-based trust management
-
Galway, Ireland
-
Bonatti, P., Duma, C., Olmedilla, D., & Shahmehri, N. (2005). An integration of reputationbased and policy-based trust management. In Semantic Web Policy Workshop in Conjunction with 4th International Semantic Web Conference, Galway, Ireland.
-
(2005)
Semantic Web Policy Workshop in Conjunction with 4th International Semantic Web Conference
-
-
Bonatti, P.1
Duma, C.2
Olmedilla, D.3
Shahmehri, N.4
-
4
-
-
74049104641
-
-
Cambridge, MA: MIT Internal Report
-
Bonawitz, K., Chandrasekhar, C., & Viana, R. (2004). Portable reputations with EgoSphere. Cambridge, MA: MIT Internal Report.
-
(2004)
Portable Reputations with EgoSphere
-
-
Bonawitz, K.1
Chandrasekhar, C.2
Viana, R.3
-
6
-
-
84856154940
-
Legal challenges of online reputation systems
-
In L. K. R. Song, Hershey, PA: IGI Global
-
Chandler, J., El-Khatib, K., Benyoucef, M., Bochmann, G., & Adams, C. (2007). Legal Challenges of Online Reputation Systems. In L. K. R. Song, Trust in e-services: Technologies, practices and challenges (pp. 84-111). Hershey, PA: IGI Global.
-
(2007)
Trust in E-services: Technologies, Practices and Challenges
, pp. 84-111
-
-
Chandler, J.1
El-Khatib, K.2
Benyoucef, M.3
Bochmann, G.4
Adams, C.5
-
7
-
-
77955338722
-
-
November 1, Retrieved from
-
Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M., et al. (2006, November 1). The platform for privacy preferences 1.1 (P3P1.1) specification. Retrieved from http://www.w3.org/TR/P3P11/
-
(2006)
The Platform for Privacy Preferences 1.1 (P3P1.1) Specification
-
-
Cranor, L.1
Dobbs, B.2
Egelman, S.3
Hogben, G.4
Humphrey, J.5
Langheinrich, M.6
-
10
-
-
7044268167
-
Trust networks on the semantic web
-
Helsinki, Finland. Berlin: Springer
-
Golbeck, J., Parisa, B., & Hendler, J. (2003). Trust networks on the Semantic Web. In Proceedings of Cooperative Intelligent Agents (pp. 238-249), Helsinki, Finland. Berlin: Springer.
-
(2003)
Proceedings of Cooperative Intelligent Agents
, pp. 238-249
-
-
Golbeck, J.1
Parisa, B.2
Hendler, J.3
-
11
-
-
84884667624
-
Conceptions of trust: Definition, constructs, and models
-
In R. Song, L. Korba, & a. G. Yee, (Eds.), Hershey, PA, IGI Global
-
Grandison, T. (2007). Conceptions of trust: Definition, constructs, and models. In R. Song, L. Korba, & a. G. Yee, (Eds.), Trust in e-services: Technologies, practices and challenges (pp. 1-28). Hershey, PA: IGI Global.
-
(2007)
Trust in E-services: Technologies, Practices and Challenges
, pp. 1-28
-
-
Grandison, T.1
-
12
-
-
74049092988
-
Trust management tools
-
In R. Song, L. Korba, & G. Yee, Hershey, PA: IGI Global
-
Grandison, T. (2007). Trust management tools. In R. Song, L. Korba, & G. Yee, Trust in e-services: Technologies, practices and challenges, (pp. 198-216). Hershey, PA: IGI Global.
-
(2007)
Trust in E-services: Technologies, Practices and Challenges
, pp. 198-216
-
-
Grandison, T.1
-
13
-
-
34248221766
-
Trust but verify: Emergence, trust, and quality in intelligent systems
-
V.B., [Washington, DC: IEEE Xplore.]
-
Kashyap, V., & V, B. (2004). Trust but verify: Emergence, trust, and quality in Intelligent Systems. [Washington, DC: IEEE Xplore.]. IEEE Intelligent Systems, 85-88.
-
(2004)
IEEE Intelligent Systems
, pp. 85-88
-
-
Kashyap, V.1
-
14
-
-
0004265759
-
-
Hoboken, NJ, John Wiley & Sons Inc
-
Luhmann, N. (1983). Trust and Power. Hoboken, NJ: John Wiley & Sons Inc.
-
(1983)
Trust and Power
-
-
Luhmann, N.1
-
15
-
-
34249742078
-
-
August 1, Retrieved from
-
MacKenzie, M., Laskey, K., McCabe, F., Brown, P., & Metz, R. (2006, August 1). Reference Model for Service OrientedArchitecture 1.0. Retrieved from http://www.oasis-open.org/committees/download.php/19679/soa-rm-cs.pdf
-
(2006)
Reference Model for Service OrientedArchitecture 1.0
-
-
Mackenzie, M.1
Laskey, K.2
McCabe, F.3
Brown, P.4
Metz, R.5
-
16
-
-
57749094662
-
-
Microsoft Developer Network, May 1, Retrieved from
-
Microsoft Developer Network. (2005, May 1). Microsoft's Vision for an Identity Metasystem. Retrieved from http://msdn.microsoft.com/en-us/library/ms996422.aspx
-
(2005)
Microsoft's Vision for an Identity Metasystem
-
-
-
17
-
-
84943576414
-
Friend and foes: Preventing selfishness in open mobile ad hoc networks
-
Providence, RI. Washington, DC: IEEE Computer Society Press
-
Miranda, H., & Rodrigues, L. (2003). Friend and foes: Preventing selfishness in open mobile ad hoc networks. In Proc. of 1st International Workshop on Mobile Distributed Computing (pp. 440-445), Providence, RI. Washington, DC: IEEE Computer Society Press.
-
(2003)
Proc. of 1st International Workshop on Mobile Distributed Computing
, pp. 440-445
-
-
Miranda, H.1
Rodrigues, L.2
-
18
-
-
21244462147
-
-
OASIS, March, Retrieved from
-
OASIS. (2004, March). Web Services Security. Retrieved from http://www-128.ibm.com/developerworks/library/specification/ws-secure/
-
(2004)
Web Services Security
-
-
-
19
-
-
70350334325
-
-
OASIS, August 01, Retrieved from
-
OASIS. (2008, August 01). SAML specifications. Retrieved from http://saml.xml.org/samlspecifications
-
(2008)
SAML Specifications
-
-
-
20
-
-
75649150409
-
-
December 4th, Retrieved December 4th, 2007, from
-
OAuth Workgroup, O. C. (2007, December 4th). OAuth Core 1.0. Retrieved December 4th, 2007, from http://oauth.net/core/1.0/
-
(2007)
OAuth Core 1.0
-
-
OAuth Workgroup, O.C.1
-
21
-
-
62949135976
-
Enlightenment 2.0: Facilitating user control in distributed collaborative applications
-
Sydney. Washington, DC: IEEE
-
Quasthoff, M. (2008). Enlightenment 2.0: Facilitating user control in distributed collaborative applications. In Proc. of the 2008 WI-IAT Doctoral Workshop, Sydney. Washington, DC: IEEE.
-
(2008)
Proc. of the 2008 WI-IAT Doctoral Workshop
-
-
Quasthoff, M.1
-
22
-
-
48349144324
-
Why https is not enough - A signature-based architecture for trusted content on the social web
-
Silicon Valley. Washington, DC: IEEE
-
Quasthoff, M., Sack, H., & Meinel, C. (2007). Why HTTPS is not enough - A signature-based architecture for trusted content on the social Web. In Proc. of the 2007 International Conference on Web Intelligence, (pp. 820-824), Silicon Valley. Washington, DC: IEEE.
-
(2007)
Proc. of the 2007 International Conference on Web Intelligence
, pp. 820-824
-
-
Quasthoff, M.1
Sack, H.2
Meinel, C.3
-
23
-
-
0033903726
-
Supporting trust in virtual communities
-
Hawaii
-
Rahman, A., & Hailes, S. (2000). Supporting trust in virtual communities. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, (Vol.6, pp.6007), Hawaii.
-
(2000)
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences
, vol.6
, pp. 6007
-
-
Rahman, A.1
Hailes, S.2
-
25
-
-
84898295519
-
Usercentric identity, trust and privacy
-
In R. Song, L. Korba, & G. Yee, Hershey, PA: IGI Global
-
Seigneur, J.-M., & Jensen, C. D. (2007). Usercentric identity, trust and privacy. In R. Song, L. Korba, & G. Yee, Trust in e-services: technologies, practices and challenges (pp. 293-322). Hershey, PA: IGI Global.
-
(2007)
Trust in E-services: Technologies, Practices and Challenges
, pp. 293-322
-
-
Seigneur, J.-M.1
Jensen, C.D.2
-
26
-
-
33751049091
-
A fuzzy model for reasoning about reputation in web services
-
Dijon, France, ACM
-
Sherchan, W., Loke, S. W., & Krishnaswamy, S. (2006). A fuzzy model for reasoning about reputation in web services. Proceedings of the 2006 ACM symposium on Applied computing (pp. 1886-1892). Dijon, France: ACM.
-
(2006)
Proceedings of the 2006 ACM Symposium on Applied Computing
, pp. 1886-1892
-
-
Sherchan, W.1
Loke, S.W.2
Krishnaswamy, S.3
-
28
-
-
34250730735
-
Enhanced recommendations through propagation of trust and distrust
-
Hong Kong. Washington, DC: IEEE Computer Society
-
Victor, P., Cornelis, C., & Cock, M. (2006). Enhanced recommendations through propagation of trust and distrust. Proceedings of the 2006 IEEE/ WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, (pp. 263-266), Hong Kong. Washington, DC: IEEE Computer Society.
-
(2006)
Proceedings of the 2006 IEEE/ WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
, pp. 263-266
-
-
Victor, P.1
Cornelis, C.2
Cock, M.3
-
29
-
-
0009825737
-
-
June 1, Retrieved from
-
Winer, D. (2003, June 1). XML-RPC Specification. Retrieved from http://www.xmlrpc.com/spec.
-
(2003)
XML-RPC Specification
-
-
Winer, D.1
|