Trusting technology: introduction
Communications of the ACM
Communications of the ACM
Trust through evaluation and certification?
Social Science Computer Review - The digital imperative of social sciences in the new millenium
Trust and deception in virtual societies
Trust and deception in virtual societies
Trust management tools for internet applications
iTrust'03 Proceedings of the 1st international conference on Trust management
Experience with the keynote trust management system: applications and future directions
iTrust'03 Proceedings of the 1st international conference on Trust management
A trusted method for self-profiling in e-commerce
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy
iTrust'05 Proceedings of the Third international conference on Trust Management
Semantic similarity model for risk assessment in forming cloud computing SLAs
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
User-centric identity management using trusted modules
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
A trust assignment model based on alternate actions payoff
iTrust'06 Proceedings of the 4th international conference on Trust Management
Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.00 |
This paper reviews trust from both a social and technological perspective and proposes a distinction between persistent and dynamic trust. Furthermore, this analysis is applied within the context of trusted computing technology.