Results 221 to 230 of about 185,761 (273)

Information flow in trust management systems [PDF]

open access: closedJournal of Computer Security, 2012
This article proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is needed to adequately describe, analyze and mitigate a class of probing attacks which allow an adversary to infer any confidential fact within a policy.
Moritz Y. Becker
  +4 more sources

Trust management in privacy — Preserving information system

open access: closed2010 3rd International Conference on Computer Science and Information Technology, 2010
In many information management applications, sensitive information must be stored as a record and be retrieved when necessary. When the recored is stored in a distributed way in multiple databases and shared by multiple users with different trust levels and accessing privileges, the trust management model is called M-to-M model.
Kun Peng, Feng Bao
openalex   +3 more sources

The Research on Information Management System Construction of Trust Company

open access: closedApplied Mechanics and Materials, 2013
On the whole, Information management of the trust industry does not keep pace with the development of trust business. This paper proposes an exploitation model of information management system for trust company and expounds the organizational structure of the system in detail.
Bin Meng, Dan Han, Jia Zhu
openalex   +3 more sources

Technology for Cultural Resource Management: The Historic House Trust Information System

open access: closedJournal of the American Institute for Conservation, 2003
AbstractThe Historic House Trust of New York City, a nonprofit organization that manages the 22 historic sites owned by the City of New York Department of Parks and Recreation, has turned to technology to facilitate the preservation of these resources.
Benjamin Haavik
  +5 more sources

On the Convergence of Structured Search, Information Retrieval and Trust Management in Distributed Systems [PDF]

open access: closed, 2005
The database and information retrieval communities have long been recognized as being irreconcilable. Today, however, we witness a surprising convergence of the techniques used by both communities in decentralized, large-scale environments. The newly emerging field of reputation based trust management, borrowing techniques from both communities, best ...
Karl Aberer   +2 more
openalex   +2 more sources

Building and Management of Trust in Information Systems

open access: closed, 2005
Thanks to the rapidly developing information and communication technologies, the complexity of networked organizations becomes very high, so the representation of their structure, the description of their operation, and their control needs new technologies and approaches. The availability of individuals independent from location and time means mobility,
István Mezgár
openalex   +3 more sources

Building and Management of Trust in Networked Information Systems

open access: closed, 2013
Thanks to rapidly developing information and communication technologies, the complexity of networked organizations has become very high, so the representation of their structure and the description of their operation and their control need new technologies, new approaches.
István Mezgár
  +4 more sources

The Establishment of End-user Trust in Web Information Management Systems

open access: closed2010 Second International Conference on Multimedia and Information Technology, 2010
Lots of dishonesty actions and unreliable services flood the present applications based on Web. The paper presents an end-user trust management model for web information system by the theory of reasoned action and the technology acceptance model.
Lv Fengqi
openalex   +3 more sources

The Implementation of Trusted Computing Based Network Trusted Management Information System

open access: closedAdvanced Materials Research, 2012
In this paper, the application of Trusted Computing Platform is discussed. It is pointed out that the purpose of network management information system by trusted Computing platform is to set up a trusted network system. Based on the analysis of the environment of the trusted network information management system, we employ a trusted computing model in ...
Hui Hong Lu
openalex   +3 more sources

Establishing Trust Management in an Open Source Collaborative Information Repository: An Emergency Response Information System Case Study

open access: closed2009 42nd Hawaii International Conference on System Sciences, 2009
This paper explores the design and evaluation of a trust model to establish trust management in an open source collaborative information repository for an emergency response environment. The proposed model is an instantiation of the SECURE framework and it is based on the characteristics of trust defined by recent information systems research ...
Evren Eryilmaz   +2 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy