A survey of trust in computer science and the semantic web
D Artz, Y Gil - Journal of Web Semantics, 2007 - Elsevier
Trust is an integral component in many kinds of human interaction, allowing people to act
under uncertainty and with the risk of negative consequences. For example, exchanging …
under uncertainty and with the risk of negative consequences. For example, exchanging …
E-commerce: protecting purchaser privacy to enforce trust
G Antoniou, L Batten - Electronic commerce research, 2011 - Springer
It has been well documented that lack of trust between commercial entities and purchasers
can restrict the potential of e-commerce. This may be because the purchaser is required to …
can restrict the potential of e-commerce. This may be because the purchaser is required to …
Trading privacy for trust
JM Seigneur, CD Jensen - International Conference on Trust Management, 2004 - Springer
Both privacy and trust relate to knowledge about an entity. However, there is an inherent
conflict between trust and privacy: the more knowledge a first entity knows about a second …
conflict between trust and privacy: the more knowledge a first entity knows about a second …
A review for ubiquitous commerce research and application (2000-2009)
L Zhang, Q Liu - International Journal of Mobile …, 2011 - inderscienceonline.com
As the next generation of business model, ubiquitous commerce (u-commerce) triggered a
lot of attention among the academic circle, enterprises and governmental agencies. We …
lot of attention among the academic circle, enterprises and governmental agencies. We …
A survey on trust computation in the internet of things
GM Lee - Information and Communications Magazine, 2016 - researchonline.ljmu.ac.uk
Internet of Things defines a large number of diverse entities and services which interconnect
with each other and individually or cooperatively operate depending on context, conditions …
with each other and individually or cooperatively operate depending on context, conditions …
[PDF][PDF] Trust, security and privacy in global computing
JM Seigneur - 2005 - tara.tcd.ie
During the past thirty years, the world of computing has evolved from large centralised
computing centres to an increasingly distributed computing environment, where computation …
computing centres to an increasingly distributed computing environment, where computation …
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within
computing infrastructures that is blended into a background and no longer be reminded …
computing infrastructures that is blended into a background and no longer be reminded …
Ubiquitous computing environments and its usage access control
Ubiquitous computing aims to enhance computer use by utilizing many computer resources
available through physical environments, but also making them invisible to users. The …
available through physical environments, but also making them invisible to users. The …
Privacy in pervasive computing and open issues
P Bhaskar, SI Ahamed - The Second International Conference …, 2007 - ieeexplore.ieee.org
Privacy appears as a major issue for pervasive computing applications. Several models
have been proposed to address privacy challenges. Successful design requires awareness …
have been proposed to address privacy challenges. Successful design requires awareness …
From e to u: Towards an innovative digital era
SP Angelopoulos, FC Kitsios… - Ubiquitous and Pervasive …, 2010 - igi-global.com
Abstract Telecommunications and Internet Technologies have evolved dramatically during
the last decade, laying a solid foundation for the future generation of Ubiquitous Internet …
the last decade, laying a solid foundation for the future generation of Ubiquitous Internet …