Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,897,266 papers from all fields of science
Search
Sign In
Create Free Account
Computational trust
Known as:
Trust
In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Artificial intelligence
Authorization
Cryptography
E-commerce
Expand
Broader (2)
Computer access control
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
On some Challenges for Online Trust and Reputation Systems
Mozhgan Tavakolifard
2012
Corpus ID: 153572308
Trust is situation-specific and the trust judgment problem with which the truster is confronted might be, in some ways, similar…
Expand
2012
2012
Unifying management of future networks with trust
L. Ciavaglia
,
Samir Ghamri-Doudane
,
+4 authors
B. Sayraç
Bell Labs technical journal
2012
Corpus ID: 205516841
Stability, robustness, and security issues arising from future self-organizing networks (SONs) must be understood today, in order…
Expand
2011
2011
Security, trust and privacy (STP) framework for federated single sign-on environment
Zubair Ahmad Khattak
,
S. Sulaiman
,
J. Manan
ICIMU : Proceedings of the 5th international…
2011
Corpus ID: 12022266
Trust and privacy are hot and open concerns in Open Environment (OE). The Conventional Computing Platform (CCP) is deficient of…
Expand
2010
2010
Hybrid transitive trust mechanisms
Jie Tang
,
Sven Seuken
,
D. Parkes
Adaptive Agents and Multi-Agent Systems
2010
Corpus ID: 5655132
Establishing trust amongst agents is of central importance to the development of well-functioning multi-agent systems. For…
Expand
2010
2010
A computational trust model for access control in P2P
B. Lang
Science China Information Sciences
2010
Corpus ID: 29481004
Trust brings a new method for building scalable and fine-grained access control mechanism in P2P systems. The quantificational…
Expand
2009
2009
Information Foraging Theory as a Form of Collective Intelligence for Social Search
Luca Longo
,
Stephen Barrett
,
Pierpaolo Dondio
International Conference on Computational…
2009
Corpus ID: 15309864
The World Wide Web is growing in size and with the proliferation of large-scale collaborative computing environments Social…
Expand
2009
2009
Online Trust Mechanisms: A Domain Study of Online Auctions
G. Bewsell
Australasian Journal of Information Systems
2009
Corpus ID: 15811956
This research investigates mechanisms that impact trust at online auctions. A qualitative study is discussed within this paper to…
Expand
2007
2007
Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings
Wsoc
,
Ncus
,
+4 authors
M. Denko
EUC Workshops
2007
Corpus ID: 34711722
Trustworthiness, Reliability and Services in Ubiquitous and Sensor Networks.- Attack-Resilient Random Key Distribution Scheme for…
Expand
2003
2003
Effects of Trust Mechanisms on Supply Chain Performance Using Multi-agent Simulation and Analysis
F. Lo
2003
Corpus ID: 30300027
In this study, we seek to understand the effect of trust on supply chain performance under different market environments. We…
Expand
Highly Cited
2001
Highly Cited
2001
Trustlet, Open Research on Trust Metrics
P. Massa
,
Kasper Souren
,
Martino Salvetti
,
Danilo Tomasoni
Business Information Systems
2001
Corpus ID: 14205024
A trust metric is a technique for predicting how much a user of a social network might trust another user. This is especially…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE