Results 281 to 290 of about 150,216 (340)

Secure Computing for Fog-Enabled Industrial IoT. [PDF]

open access: yesSensors (Basel)
Alvi AN   +5 more
europepmc   +1 more source

Novel model to authenticate role-based medical users for blockchain-based IoMT devices. [PDF]

open access: yesPLoS One
Aslam MS   +7 more
europepmc   +1 more source

Trusting Computers Through Trusting Humans

International Journal of Technology and Human Interaction, 2007
This article considers the question of how we may trust automatically generated program code. The code walkthroughs and inspections of software engineering mimic the ways that mathematicians go about assuring themselves that a mathematical proof is true.
Paul Spedding, Alison Adam
openaire   +2 more sources

A Trust Logic for Pre-Trust Computations

2018 21st International Conference on Information Fusion (FUSION), 2018
Computational trust is the digital counterpart of the human notion of trust as applied in social systems. Its main purpose is to improve the reliability of interactions in online communities and of knowledge transfer in information management systems. Trust models are formal frameworks in which the notion of computational trust is described rigorously ...
Tagliaferri, Mirko, Aldini, Alessandro
openaire   +2 more sources

Home - About - Disclaimer - Privacy