Results 261 to 270 of about 2,322,677 (316)
Some of the next articles are maybe not open access.
Trust-Oriented Research Methods in Cloud Environment
2013 10th Web Information System and Application Conference, 2013One of the obvious challenges in cloud environments is trust crisis and its influence on the development of cloud computing. This paper analyzes the similarities and differences between cloud computing and other distributed environments, proposes the concept of trust and three different directions of trust-oriented research in cloud environments ...
Yan Wang, Jiantao Zhou
openaire +1 more source
Let virtual creatures stay virtual: tactics to increase trust in virtual influencers
Journal of Research in Interactive Marketing, 2023PurposeAdvances in technology and the popularity of social media influencers have sparked a rise of “virtual influencers (VIs).” This study examines consumer attitudes toward VIs in social networking services and explores factors that enhance or dampen ...
Yingjing Qu, Eunsoo Baek
semanticscholar +1 more source
Trusted and GDPR-compliant research with the internet of things
IoT, 2018The Internet of Things has become a key enabling technology for data-intensive research across universities and private organisations alike. However, the recent introduction of the General Data Protection Regulation (GDPR) in Europe has raised concerns ...
J. Bourgeois, Gerd Kortuem, F. Kawsar
semanticscholar +1 more source
Research of Mobile Agent Trust Management Model in Trusted Computing Environment
2010 International Conference on Computational Intelligence and Software Engineering, 2010This paper discusses the trust management and extended model based on the trust chain establishment and management on trusted computing platform. The model was applied to distributed system based on mobile agent to enhance its security. For the problems of trust management in the extended mobile agent system, the extended alternant process between ...
Aili Chen, Xiaoping Wu
openaire +1 more source
A Research Agenda for Trust in Online Environments
Journal of Management Information Systems, 2008We present an agenda for the future research that has the potential to extend the conceptual foundations of trust in online environments and to improve the practice in the domain. The agenda draws on the previous work on trust, the papers included in this Special Issue, and our perspective on the state of the literature.
David Gefen, Izak Benbasat, Paula Pavlou
openaire +1 more source
RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone
IEEE Symposium on Security and Privacy, 2022Embedded devices are becoming increasingly pervasive in safety-critical systems of the emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM TrustZone, have been widely deployed in mobile platforms, little attention has ...
Jinwen Wang +4 more
semanticscholar +1 more source
Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms
IFIP International Information Security Conference, 2018The recent edge computing infrastructure introduces a new computing model that works as a complement of the traditional cloud computing. The edge nodes in the infrastructure reduce the network latency of the cloud computing model and increase data ...
Zhenyu Ning +3 more
semanticscholar +1 more source
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
Computer Communications, 2020In recent years, the Internet of Drones (IoD) has emerged as an important research topic in the academy and industry because it has several potential applications ranging from the civilian to military.
Basudeb Bera, Durbadal Chattaraj, A. Das
semanticscholar +1 more source
Trusted Research Environments - Landscape report
The landscape of Trusted Research Environments (TREs) in Europe is extensive, with this report identifying 40 TREs across various themes and disciplines. These TREs are produced by National Research and Education Networks (NRENs), Research Performing Organizations (RPOs), and specific projects.Tenhunen, Ville +8 more
openaire +1 more source
The Research of Trusted Technology under Cloud Environment
2013 International Conference on Information Science and Cloud Computing Companion, 2013In the current cloud environments, there are some problems of information in security and reliability. In order to establish more flexible and adaptable security mechanism, combining the cloud and credible is a major research direction in the field of security today. In this paper we studied some credible technology in cloud computing environment and a
Yinghong Lou, Wenlin Wang
openaire +1 more source

