نتایج جستجو برای: basic trust
تعداد نتایج: 329153 فیلتر نتایج به سال:
There are currently very few practical methods for assessing the quality of resources or the reliability of other entities in the online environment. This makes it difficult to make decisions about which resources can be relied upon and which entities it is safe to interact with. Trust and reputation systems are aimed at solving this problem by enabling service consumers to reliably assess the ...
Psychosis is characterized by an elementary lack of trust in others. Trust is an inherently rewarding aspect of successful social interactions and can be examined using neuroeconomic paradigms. This study was aimed at investigating the underlying neural basis of diminished trust in psychosis. Functional magnetic resonance imaging data were acquired from 20 patients with psychosis and 20 healthy...
It is unnecessary and counterproductive to sacrifice basic human rights to respond to bioterrorism. Constructive public health legislation, which must be federal, cannot be carefully drafted under panic conditions. When it is, like the "model act," it will predictably rely on broad, arbitrary state authority exercised without public accountability. Public health should resist reverting to its n...
Title of dissertation: COMPUTING AND APPLYING TRUST IN WEB-BASED SOCIAL NETWORKS Jennifer Ann Golbeck, Doctor of Philosophy, 2005 Dissertation directed by: Professor James Hendler Department of Computer Science The proliferation of web-based social networks has lead to new innovations in social networking, particularly by allowing users to describe their relationships beyond a basic connection....
The paper presents a survey of mature Free/Libre Open Source Software communities. The main focus of the survey is the collection of data related to the practices of these communities related to trust elements in their products. The survey is carried out using a structured questionnaire about thoughts and practices followed by Free/Libre Open Source Software communities. The survey focuses on t...
In this paper we introduce basic knowledge of Trusted Computing briefly. And then, we describe attack towards trusted computing system, and also discuss vulnerability of modern trusted computing system. We will exam two solutions, which can be named under using ’dynamic root of trust’, for these problems. Generally, it will change the ’old’ architecture of ’static root of trust’-based trusted c...
Large-scale transactional systems still suffer from not viable trust management strategies. Given its intrinsic characteristics, blockchain technology appears as interesting from this perspective. A semantic layer built upon a basic blockchain infrastructure would join the benefits of flexible resource/service discovery and validation by consensus. This paper proposes a novel Service-oriented A...
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasingly popular, proliferation of spam calls is only a matter of time. As SIP identity scheme is practically similar to email, those share the same threats. We utilized Host Identity Protocol (HIP) to provide basic securit...
B. Gajdzik, The Silesian University of Technology, Faculty of Materials Science and Metallurgy, Katowice, Poland K. Grzybowska, Poznan University of Technology, Faculty of Engineering Management, Poznan, Poland The article is an introduction to the notion of building trust in supply chains. Foreign publishers off er many articles connected with trust and some of the most important ones were quo...
MANET (Mobile Ad-hoc Network) is hot spot for research due to its various advantages and disadvantages. Providing safe communication between mobile nodes, recognization the position of nodes, reducing overhead, handling misbehavior and location updates are such a difficult issues in ad-hoc network, so providing trust schemes is an important in this network. MANET provides some basic functions l...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید