|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 903 occurrences of 491 keywords
|
|
|
Results
Found 1893 publication records. Showing 1893 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Maya B. Mathur, David B. Reichling |
An uncanny game of trust: social trustworthiness of robots inferred from subtle anthropomorphic facial cues. |
HRI |
2009 |
DBLP DOI BibTeX RDF |
game theory, social interaction, facial expression, android, anthropomorphism, humanoid, uncanny valley |
23 | Thomas Tan, Mei He, Ye Yang, Qing Wang 0001, Mingshu Li 0001 |
An Analysis to Understand Software Trustworthiness. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Matthew Judge, Paul D. Williams, Yong Kim, Barry E. Mullins |
Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information. |
WISTP |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Arnaud Gaudinat, Natalia Grabar, Célia Boyer |
Automatic Retrieval of Web Pages with Standards of Ethics and Trustworthiness Within a Medical Portal: What a Page Name Tells Us. |
AIME |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Farookh Khadeer Hussain, Elizabeth Chang 0001, Tharam S. Dillon |
Aspects Influencing Trustworthiness In Service Oriented Environments. |
ICDE Workshops |
2006 |
DBLP DOI BibTeX RDF |
Trusting Peer, Trusted Peer, Trust, Factors |
23 | Omar Batarfi, Lindsay F. Marshall |
Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa 0001, Tomoya Enokido, S. Misbah Deen |
Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay Networks. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa 0001, S. Misbah Deen |
Trustworthiness in Peer-to-Peer Overlay Networks. |
SUTC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Kenichi Watanabe, Yoshio Nakajima, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa 0001, S. Misbah Deen |
Trustworthiness of Peers Based on Access Control in Peer-to-Peer Overlay Networks. |
ICDCS Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Kenichi Watanabe, Yoshio Nakajima, Naohiro Hayashibara, Makoto Takizawa 0001, Tomoya Enokido, S. Misbah Deen |
Service Oriented Trustworthiness of Acquaintances in Peer-to-Peer Overlay Networks. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Rui He, Jianwei Niu 0002, Kai Hu |
A Novel Approach to Evaluate Trustworthiness and Uncertainty of Trust Relationships in Peer-to-Peer Computing. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Hailong Sun 0001, Yanmin Zhu, Chunming Hu, Jinpeng Huai, Yunhao Liu 0001, Jianxin Li 0002 |
Early Experience of Remote and Hot Service Deployment with Trustworthiness in CROWN Grid. |
APPT |
2005 |
DBLP DOI BibTeX RDF |
Remote and hot deployment, ROST, Trust Negotiation Agent (TNA), Service grid, CROWN |
23 | Johan W. Klüwer, Arild Waaler |
Relative Trustworthiness. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Sara Sinclair, Sean W. Smith |
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Patricia Lanford, Roland Hübscher |
Trustworthiness in e-commerce. |
ACM Southeast Regional Conference |
2004 |
DBLP DOI BibTeX RDF |
human-computer interaction, usability, trust, e-commerce |
23 | Victor A. Tsygankov |
Evaluation of website trustworthiness from customer perspective, a framework. |
ICEC |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Rino Falcone, Giovanni Pezzulo, Cristiano Castelfranchi, Gianguglielmo Calvi |
Contract Nets for Evaluating Agent Trustworthiness. |
Trusting Agents for Trusting Electronic Societies |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Bessie Chong, Zhilin Yang, Michael C. S. Wong |
Asymmetrical impact of trustworthiness attributes on trust, perceived value and purchase intention: a conceptual framework for cross-cultural study on consumer perception of online auction. |
ICEC |
2003 |
DBLP DOI BibTeX RDF |
purchase intention, trust, online auction, consumer behavior |
18 | Yannis Theoharis, Irini Fundulaki, Grigoris Karvounarakis, Vassilis Christophides |
On Provenance of Queries on Semantic Web Data. |
IEEE Internet Comput. |
2011 |
DBLP DOI BibTeX RDF |
relational provenance, Semantic Web, reliability, Provenance, trustworthiness, SPARQL |
18 | Jinhui Yao, Shiping Chen 0001, Chen Wang 0008, David Levy 0001, John Zic |
Modelling Collaborative Services for Business and QoS Compliance. |
ICWS |
2011 |
DBLP DOI BibTeX RDF |
service orieanted architecture, service collaboration, accountability, trustworthiness, compliance |
18 | |
Design & Test in the new decade: Continuity and new directions. |
IEEE Des. Test Comput. |
2010 |
DBLP DOI BibTeX RDF |
physical trustworthiness, Trojans, VPOS, verification, design and test |
18 | Jinhui Yao, Shiping Chen 0001, Chen Wang 0008, David Levy 0001, John Zic |
Accountability as a Service for the Cloud: From Concept to Implementation with BPEL. |
SERVICES |
2010 |
DBLP DOI BibTeX RDF |
service orieanted architecture, cloud computing, accountability, trustworthiness |
18 | Lusha Wang, Raquel Hill |
Trust Model for Open Resource Control Architecture. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
ORCA, Site Authority, Slice, Trustworthiness, Trust Model, Service Manager, Broker, GENI |
18 | Hamed Khiabani, Zailani Mohamed Sidek, Jamalul-lail Ab Manan |
Towards a Unified Trust Model in Pervasive Systems. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
Trust, Pervasive Computing, Formalization, Trustworthiness, TPM |
18 | Jinhui Yao, Shiping Chen 0001, Chen Wang 0008, David Levy 0001, John Zic |
Accountability as a Service for the Cloud. |
IEEE SCC |
2010 |
DBLP DOI BibTeX RDF |
service orieanted architecture, cloud computing, accountability, trustworthiness |
18 | Peter de Vries, Thomas J. L. Van Rompay |
Subtle persuasion: the unobtrusive effect of website-banner congruence on trust. |
PERSUASIVE |
2009 |
DBLP DOI BibTeX RDF |
congruity, initial trust, trustworthiness, congruence, online trust |
18 | Yaohang Li, Daniel Chen, Xiaohong Yuan |
Trustworthy remote compiling services for grid-based scientific applications. |
J. Supercomput. |
2007 |
DBLP DOI BibTeX RDF |
Security, Grid computing, Trustworthiness, Remote execution |
18 | Susanne Dobratz, Astrid Schoger |
Trustworthy Digital Long-Term Repositories: The Nestor Approach in the Context of International Developments. |
ECDL |
2007 |
DBLP DOI BibTeX RDF |
Certification, Auditing, Trustworthiness, Standardisation, Long-Term Preservation, Digital Repositories |
18 | Vasu S. Alagar, Mubarak Mohammad |
Specification and verification of trustworthy component-based real-time reactive systems. |
SAVCBS |
2007 |
DBLP DOI BibTeX RDF |
components, trustworthiness, real-time reactive systems |
18 | Shuo Yang, Ali Raza Butt, Xing Fang, Y. Charlie Hu, Samuel P. Midkiff |
A Fair, Secure and Trustworthy Peer-to-Peer Based Cycle-Sharing System. |
J. Grid Comput. |
2006 |
DBLP DOI BibTeX RDF |
Peer-to-peer, Grid, Monitoring, Fairness, Incentive, Trustworthiness, Cycle-sharing |
18 | Kyung Hyan Yoo, Ulrike Gretzel |
Measuring the Credibility of Recommender Systems. |
ENTER |
2006 |
DBLP DOI BibTeX RDF |
recommender systems, trustworthiness, credibility, expertise, scale development |
18 | Ranjit Raveendran, William C. Cheng, Leana Golubchik |
Scalable and secure data collection: incentives considerations. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
scalable data collection, incentives, trustworthiness |
18 | Danilo Bruschi, Bart De Win, Mattia Monga |
Software engineering for secure systems. |
ICSE |
2006 |
DBLP DOI BibTeX RDF |
trustworthiness, security requirements, security testing, security usability, secure programming |
18 | Rogério de Lemos |
Software architectures for dependable systems: a software engineering perspective. |
ICSE |
2006 |
DBLP DOI BibTeX RDF |
fault-tolerance, software architecture, dependability, trustworthiness |
18 | Carsten D. Schultz |
A trust framework model for situational contexts. |
PST |
2006 |
DBLP DOI BibTeX RDF |
trust framework model, trust, trustworthiness |
18 | Dickson K. W. Chiu, Ho-fung Leung, Ka-man Lam |
Making personalized recommendations to customers in a service-oriented economy: a quantitative model based on reputation and risk attitude. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
risk attitude, reputation, persuasiveness, trustworthiness, impression |
18 | Rogério de Lemos, Alexander B. Romanovsky |
Workshop on architecting dependable systems (WADS 2005). |
ICSE |
2005 |
DBLP DOI BibTeX RDF |
fault-tolerance, software architecture, dependability, trustworthiness |
18 | Shuo Yang, Ali Raza Butt, Y. Charlie Hu, Samuel P. Midkiff |
Trust but verify: monitoring remotely executing programs for progress and correctness. |
PPoPP |
2005 |
DBLP DOI BibTeX RDF |
progress monitoring, security, grid computing, trustworthiness, correctness verification, cycle-sharing |
18 | Patrick Cousot, Radhia Cousot |
An abstract interpretation-based framework for software watermarking. |
POPL |
2004 |
DBLP DOI BibTeX RDF |
software authorship, stegoanalyst, stegoattacks, stegokey, stegomark, stegosignature, validation watermarking, authentication, static analysis, abstract interpretation, steganography, fingerprinting, identification, copyrights protection, trustworthiness, obfuscation, intellectual property protection, software watermarking, tamper-proofing |
18 | Matti A. Hiltunen, Richard D. Schlichting, Carlos A. Ugarte |
Building Survivable Services Using Redundancy and Adaptation. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
distributed systems, adaptation, dependability, redundancy, Survivability, trustworthiness, intrusion tolerance |
18 | B. J. Fogg, Hsiang Tseng |
The Elements of Computer Credibility. |
CHI |
1999 |
DBLP DOI BibTeX RDF |
psychology of HCI, trust, persuasion, trustworthiness, credibility, information quality, expertise, influence, captology |
18 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Raju Balakrishnan, Subbarao Kambhampati |
SourceRank: relevance and trust assessment for deep web sources based on inter-source agreement. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
source trust, deep web, web databases, source selection |
18 | Fred B. Schneider |
Beyond hacking: an SOS! |
ICSE (1) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Michael J. Smith 0004, Marie desJardins |
Learning to trust in the competence and commitment of agents. |
Auton. Agents Multi Agent Syst. |
2009 |
DBLP DOI BibTeX RDF |
Bayesian updating, Harsanyi transformation, Prisoner’s dilemma, IPD, Pavlov, Learning, Trust, Game theory, Reputation, Decision theory, Q-learning, Evolutionary games, Bayesian Model Averaging |
18 | Anatoliy Gorbenko, Vyacheslav S. Kharchenko, Alexander B. Romanovsky |
Using Inherent Service Redundancy and Diversity to Ensure Web Services Dependability. |
Methods, Models and Tools for Fault Tolerance |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Shouhuai Xu, Moti Yung |
Expecting the Unexpected: Towards Robust Credential Infrastructure. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Credential infrastructures, key compromise, hit-and-run attack, hit-and-stick attack, digital signatures, PKI, insider attack |
18 | Qiang He 0001, Jun Yan 0005, Hai Jin 0001, Yun Yang 0001 |
ServiceTrust: Supporting Reputation-Oriented Service Selection. |
ICSOC/ServiceWave |
2009 |
DBLP DOI BibTeX RDF |
service reputation, Web services, trust, Service-oriented computing, service selection |
18 | Changsong Ding, Yi Fu, Zhigang Hu, Peng Xiao 0006 |
A Novel Trust Model Based on Bayesian Network for Service-Oriented Grid. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Ju An Wang, Hao Wang, Minzhe Guo, Min Xia 0004 |
Security metrics for software systems. |
ACM Southeast Regional Conference |
2009 |
DBLP DOI BibTeX RDF |
software quality, software security, security metrics, software vulnerabilities |
18 | Olaf Hartig |
Querying Trust in RDF Data with tSPARQL. |
ESWC |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Rajan Shankaran, Vijay Varadharajan, Mehmet A. Orgun, Michael Hitchens |
Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Hsuan Chiu, Duen-Ren Liu, Chin-Hui Lai |
Sequence-Based Trust for Document Recommendation. |
EC-Web |
2009 |
DBLP DOI BibTeX RDF |
Sequence-based Trust, Recommender System, Collaborative Filtering |
18 | Yixiang Chen, Min Zhang 0007, Hong Zhu 0004, Tian-Ming Bu |
Average Transitive Trustworthy Degrees for Trustworthy Networks. |
RSKT |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Jingwei Huang 0002, David M. Nicol |
A calculus of trust and its application to PKI and identity management. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
semantics of trust, social networks, uncertainty, PKI, risk assessment, identity management, trust modeling |
18 | Junfeng Tian, Yuzhen Lu, Peng Yuan 0008 |
A weighted closeness-based trust combination model. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
trust combination, weighted closeness, trust |
18 | Peter Y. A. Ryan |
How Many Election Officials Does It Take to Change an Election? |
ARSPA-WITS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Janice C. Sipior, Burke T. Ward |
Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation. |
Inf. Syst. Frontiers |
2008 |
DBLP DOI BibTeX RDF |
Legal protection, Privacy, Trust, Spyware |
18 | Mark Kramer, Andy Gregorowicz, Bala Iyer |
Wiki trust metrics based on phrasal analysis. |
Int. Sym. Wikis |
2008 |
DBLP DOI BibTeX RDF |
collaboration, wiki, reputation, attribution, authorship, shingling |
18 | Lan Li, Shaojun Zhang, Lei Fan 0002 |
Behavior-Aware Role Based Trust Management. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert |
Model-based behavioral attestation. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
behavioral attestation, highlevel framework, remote attestation, UCON |
18 | Nishant Kumar, Pragya Rai |
Adverse Selection in Online Search. |
DEXA Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Narges Aghakazem Jourabbaf, Ali Movaghar 0001 |
ID-NAC: Identity-based network access control for MANETs. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Omar Hasan, Jean-Marc Pierson, Lionel Brunie |
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Aleksandar Ignjatovic, Norman Foo, Chung Tong Lee |
An Analytic Approach to Reputation Ranking of Participants in Online Transactions. |
Web Intelligence |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Barbara Carminati, Elena Ferrari, Andrea Perego |
Combining Social Networks and Semantic Web Technologies for Personalizing Web Access. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Jianming Fu, Huijun Xiong, Zhou Li 0001, Huanguo Zhang |
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. |
AICCSA |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Raúl Cruz-Barbosa, Alfredo Vellido |
Geodesic Generative Topographic Mapping. |
IBERAMIA |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Junhai Luo, Xue Liu 0001, Yi Zhang 0001, Danxia Ye, Zhong Xu |
Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Jens Dietrich 0001, Nathan Jones |
Using Social Networking and Semantic Web Technology in Software Engineering--Use Cases, Patterns, and a Case Study. |
ASWEC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Adrian Leung, Chris J. Mitchell |
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. |
UbiComp |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trusted Computing, Ubiquitous |
18 | Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang 0020 |
Hierarchical Trustworthy Authentication for Pervasive Computing. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
18 | M. Harish, N. Anandavelu, N. Anbalagan, G. S. Mahalakshmi 0001, T. V. Geetha |
Design and Analysis of a Game Theoretic Model for P2P Trust Management. |
ICDCIT |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Manling Zhu, Zhi Jin |
Trust Analysis of Web Services Based on a Trust Ontology. |
KSEM |
2007 |
DBLP DOI BibTeX RDF |
Web Services, Formal Reasoning, Trust Ontology |
18 | Haiying (Helen) Shen, Yingwu Zhu |
FairTrust: Toward secure and high performance P2P networks. |
ICPADS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Eugen Staab, Thomas Engel 0001 |
Formalizing Excusableness of Failures in Multi-Agent Systems. |
PRIMA |
2007 |
DBLP DOI BibTeX RDF |
Multi-agent systems, mobile ad hoc networks, trust, service-oriented computing, dynamic environments |
18 | Mingwu Zhang, Bo Yang 0003, Yu Qi, Wenzheng Zhang |
Using Trust Metric to Detect Malicious Behaviors in WSNs. |
SNPD (3) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Yoshio Nakajima, Kenichi Watanabe, Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa 0001, S. Misbah Deen |
Cooperation of Trustworthy Peers in P2P Overlay Networks. |
ICPP Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Martin Rehák, Michal Pechoucek |
Trust Modeling with Context Representation and Generalized Identities. |
CIA |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Sandro Morasca, Alberto Sillitti |
1st International Workshop on Trust in Open Source Software (TOSS). (PDF / PS) |
OSS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Venkatesan Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula |
Trust Enhanced Secure Mobile Ad-Hoc Network Routing. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
reputation and trust, Security, mobile ad-hoc networks, intrusion detection, secure routing |
18 | Cynthia E. Irvine, Karl N. Levitt |
Trusted Hardware: Can It Be Trustworthy? |
DAC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Bin Yu, Srikanth Kallurkar, Ganesh Vaidyanathan, Donald Steiner |
Managing the pedigree and quality of information in dynamic information sharing environments. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
quality of information, trust, software agents, information sharing, Dempster-Shafer theory, pedigree |
18 | Steffen Becker 0001, Wilhelm Hasselbring, Alexandra Paul, Marko Boskovic, Heiko Koziolek, Jan Ploski, Abhishek Dhama, Henrik Lipskoch, Matthias Rohr, Daniel Winteler, Simon Giesecke, Roland Meyer 0001, Mani Swaminathan, Jens Happe, Margarete Muhle, Timo Warns |
Trustworthy software systems: a discussion of basic concepts and terminology. |
ACM SIGSOFT Softw. Eng. Notes |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Ann Miller, John McLean, O. Sami Saydjari, Jeffrey M. Voas |
COMPSAC Panel Session on Trustworthy Computing. |
COMPSAC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Jo Lumsden, Lisa MacKay |
How does personality affect trust in B2C e-commerce? |
ICEC |
2006 |
DBLP DOI BibTeX RDF |
evaluation, trust, e-Commerce, personality type |
18 | Andrew MacQuire, Andrew Brampton, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy |
Authentication in Stealth Distributed Hash Tables. |
EUROMICRO-SEAA |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Paulo Veríssimo |
Thou Shalt Not Trust non-Trustworthy Systems. |
ICDCS Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Thomas Müller 0007 |
A Question of Trust: Assessing the Fulfillment of Commitments in Terms of Strategies. |
DEON |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Pinar Yolum, Munindar P. Singh |
Engineering self-organizing referral networks for trustworthy service selection. |
IEEE Trans. Syst. Man Cybern. Part A |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Dorothy E. Leidner, Wynne W. Chin |
From the editors. |
Data Base |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Evguenia Altareva, Stefan Conrad 0001 |
Evaluating and Improving Integration Quality for Heterogeneous Data Sources Using Statistical Analysis. |
IDEAS |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Yanjun Zuo, Brajendra Panda |
Component based trust management in the context of a virtual organization. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
recommendation, information flow, trust management, virtual organization |
18 | Takamichi Sakai, Kenji Terada, Tadashi Araragi |
Robust Online Reputation Mechanism by Stochastic Approximation. |
Adaptive Agents and Multi-Agent Systems |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Elizabeth Chang 0001, Tharam S. Dillon, Farookh Khadeer Hussain |
Keynote 2: Trust and Reputation Relationships in Service-Oriented Environments. |
ICITA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Elizabeth Chang 0001, Farookh Khadeer Hussain, Tharam S. Dillon |
CCCI Metrics for the Measurement of Quality of e-Service. |
IAT |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Zhengqiang Liang, Weisong Shi |
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Stephen J. H. Yang, Blue C. W. Lan, Jen-Yao Chung |
A Trustworthy Web Services Framework for Business Processes Integration. |
WORDS |
2005 |
DBLP DOI BibTeX RDF |
Service Oriented Enterprises, Trustworthy WebServices, Business Process Integration |
18 | Aameek Singh, Sandeep Gopisetty, Linda Duyanovich, Kaladhar Voruganti, David Pease, Ling Liu 0001 |
Security vs Performance: Tradeoffs using a Trust Framework. |
MSST |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Ambareen Siraj, Rayford B. Vaughn, Susan Bridges |
Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 1893 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|