-
1Published 2007Table of Contents: “… Model for Detecting Web Spam -- Applied Computational Trust in Utilities Management: a Case Study…”
Full Text via HEAL-Link
Electronic eBook -
2Published 2001Table of Contents: “… Tracing: An Active Network-Based Intrusion Response Framework -- Trusted Platforms -- An Efficient…”
Full Text via HEAL-Link
Electronic eBook -
3Published 2009Table of Contents: “…Implementation of Trusted Computing -- Towards a Programmable TPM -- ACPI: Design Principles…”
Full Text via HEAL-Link
Electronic eBook -
4Published 2005Table of Contents: “… in Answers from the Web -- Trust Record: High-Level Assurance and Compliance -- Implementation of the SECURE…”
Full Text via HEAL-Link
Electronic eBook -
5Published 2004Table of Contents: “… in an Online Environment -- KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2008Table of Contents: “… Lightweight Binary Authentication System for Windows -- Towards Standards-Compliant Trust Negotiation for Web…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2009Table of Contents: “… Driven Web Services -- Enhancements to Subjective Logic -- Inferring Trust Based on Similarity…”
Full Text via HEAL-Link
Electronic eBook -
8Published 2014Table of Contents: “… in the web -- Trust and trustworthiness.…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2013Table of Contents: “… of Queries -- Network, Web, and Mobile Security -- A Probabilistic Framework for Distributed Localization…”
Full Text via HEAL-Link
Electronic eBook -
10Published 2013Table of Contents: “… to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage -- Lazy Mobile Intruders…”
Full Text via HEAL-Link
Electronic eBook -
11Published 2006Table of Contents: “… Trust Model for the Semantic Web -- Fuzzy Model Tuning for Intrusion Detection Systems -- PATROL-F – A…”
Full Text via HEAL-Link
Electronic eBook -
12Published 2010Table of Contents: “… Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile…”
Full Text via HEAL-Link
Electronic eBook -
13Published 2009Table of Contents: “… Semantic Web Service Discovery and Selection -- Fuzzy Regression Based Trust Prediction in Service-Oriented…”
Full Text via HEAL-Link
Electronic eBook -
14Published 2008Table of Contents: “… Attack Employing Fake Source IP in IPv6 LAN -- A Semantic-Aware Ontology-Based Trust Model for Pervasive…”
Full Text via HEAL-Link
Electronic eBook -
15Published 2014Table of Contents: “… Resilience against Concurrent Cache Attacks -- Information Flow Control in WebKit’s JavaScript Bytecode -- A…”
Full Text via HEAL-Link
Electronic eBook -
16Published 2009Table of Contents: “… Informative Feedback: The Peer-Prediction Method -- Capturing Trust in Social Web Applications -- Trust…”
Full Text via HEAL-Link
Electronic eBook -
17
-
18Published 2009Table of Contents: “… -- Model, Properties, and Applications of Context-Aware Web Services.…”
Full Text via HEAL-Link
Electronic eBook -
19Published 2012Table of Contents: “… -- web service security/trust/privacy -- grid security -- security risk assessment -- case studies.…”
Full Text via HEAL-Link
Electronic eBook -
20Published 2009Table of Contents: “…, Robustness and Fragility of Trust -- Trust within the Context of Organizations: A Formal Approach -- Know…”
Full Text via HEAL-Link
Electronic eBook