A survey of trust in computer science and the semantic web

D Artz, Y Gil - Journal of Web Semantics, 2007 - Elsevier
Trust is an integral component in many kinds of human interaction, allowing people to act
under uncertainty and with the risk of negative consequences. For example, exchanging …

E-commerce: protecting purchaser privacy to enforce trust

G Antoniou, L Batten - Electronic commerce research, 2011 - Springer
It has been well documented that lack of trust between commercial entities and purchasers
can restrict the potential of e-commerce. This may be because the purchaser is required to …

Trading privacy for trust

JM Seigneur, CD Jensen - International Conference on Trust Management, 2004 - Springer
Both privacy and trust relate to knowledge about an entity. However, there is an inherent
conflict between trust and privacy: the more knowledge a first entity knows about a second …

A review for ubiquitous commerce research and application (2000-2009)

L Zhang, Q Liu - International Journal of Mobile …, 2011 - inderscienceonline.com
As the next generation of business model, ubiquitous commerce (u-commerce) triggered a
lot of attention among the academic circle, enterprises and governmental agencies. We …

A survey on trust computation in the internet of things

GM Lee - Information and Communications Magazine, 2016 - researchonline.ljmu.ac.uk
Internet of Things defines a large number of diverse entities and services which interconnect
with each other and individually or cooperatively operate depending on context, conditions …

[PDF][PDF] Trust, security and privacy in global computing

JM Seigneur - 2005 - tara.tcd.ie
During the past thirty years, the world of computing has evolved from large centralised
computing centres to an increasingly distributed computing environment, where computation …

Access control management for ubiquitous computing

H Wang, Y Zhang, J Cao - Future Generation Computer Systems, 2008 - Elsevier
The purpose of ubiquitous computing is anywhere and anytime access to information within
computing infrastructures that is blended into a background and no longer be reminded …

Ubiquitous computing environments and its usage access control

H Wang, Y Zhang, J Cao - … of the 1st international conference on …, 2006 - dl.acm.org
Ubiquitous computing aims to enhance computer use by utilizing many computer resources
available through physical environments, but also making them invisible to users. The …

Privacy in pervasive computing and open issues

P Bhaskar, SI Ahamed - The Second International Conference …, 2007 - ieeexplore.ieee.org
Privacy appears as a major issue for pervasive computing applications. Several models
have been proposed to address privacy challenges. Successful design requires awareness …

From e to u: Towards an innovative digital era

SP Angelopoulos, FC Kitsios… - Ubiquitous and Pervasive …, 2010 - igi-global.com
Abstract Telecommunications and Internet Technologies have evolved dramatically during
the last decade, laying a solid foundation for the future generation of Ubiquitous Internet …