1,326,598 Hits in 5.3 sec

Authority and trust in information

Jens-Erik Mai, Don Fallis, Melanie Feinberg, Soo Young Rieh, Pnina Shachaf
2010 Proceedings of the American Society for Information Science and Technology  
authority and trust in information.  ...  authority and trust in information.  ... 
doi:10.1002/meet.14504701123 fatcat:l27oley36fhp3nynwofbkwbidm

A comparison of schemes for certification authorities/Trusted Third Parties [chapter]

A. Rensburg, B. Solms
1997 Information Security in Research and Business  
A comparison of schemes employed by certification authorities or trusted third parties to generate certificates.  ...  Each certification authority is described in detail to provide information for the last chapter where a reference model and both case studies are compared.  ...  Therefore it has become increasingly important for information security to address: • Information privacy. • Information integrity in term of: 0 origin of data. 0 destination. 0 content. 0 and ultimately  ... 
doi:10.1007/978-0-387-35259-6_18 fatcat:gtjkkb56cbfrzinucvdyu5grqq

Efficient Distribution of Trust Authority Functions in Tactical Networks

Steffen Reidt, Stephen D. Wolthusen
2007 2007 IEEE SMC Information Assurance and Security Workshop  
In this paper we describe an algorithm for the distribution of trust authority functions such as key generation and distribution in tactical mobile ad hoc networks.  ...  We propose the combination of metrics on both network state and beliefs or trust in other nodes to form a composite metric for use in a clustering algorithm.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S.  ... 
doi:10.1109/iaw.2007.381918 fatcat:w2bkcmxyefcxxgz6d3jacthiae

Moderating Effect of Trust in Managers on the Relation between Delegation of Authority and Managers' Perceived Social Loafing

F. Gamze Bozkurt
2012 Information Management and Business Review  
Moreover, it was found that the level of trust in managers does not moderate this relationship.  ...  Data were collected from 243 employees working in a company. Hierarchical regression analysis was used to in order to measure linear and moderator effects.  ...  In the final part of the survey, respondents were asked to provide general demographic and background information.  ... 
doi:10.22610/imbr.v4i11.1016 fatcat:rwxmif5u5zesxp2wuschvyct5q

Research on Node Authorization Trusted Update Mechanism Based on Agent Re-Encryption in IoT Cloud

Shunhui Li, Qiubi Sun, Haidong Wu
2020 International Journal of Innovative Computing, Information and Control  
This paper describes a trusted update mechanism of node authorization based on proxy re-encrypted in IoT cloud.  ...  The registered node will obtain the ciphertext data in the re-encrypted proxy server in the cloud, and obtain the decryption parameters in the node authorization management server for data decryption.  ...  Since CSP is usually semi-trusted and outsourced data containing sensitive information can only be accessed by authorized users, this will inevitably lead to many security challenges.  ... 
doi:10.24507/ijicic.16.03.867 fatcat:zqajlrjbtbay7pjdfvlupsszki

Trust, Authority, and Information Flow in Secure Distributed Systems

Michael David George
If r C( ) and then r I(authority( , )). sn this hpterD we onstrut mthemtil frmework for resoning out trust nd uthority in systems running on prtilly trusted pltformsF e de(ne generl notion of informtion  ...  Information labeled ν in)uenes a ow from µ to ν (written λ ν µ) if there exists four states s 1 , s 2 , t 1 , and t 2 such that s 1 ≈ ν t 1 and s 2 ≈ ν t 2 , and such that (s 1 , s 2 ) is a witness to  ...  whih we require dditionl nnottions on funtion types nd funtion pplitionsY these nnottions re explined in etion RFPFRF 4.2.2 Principals and Delegation rinipls in our lnguge re represented y referenes drwn  ... 
doi:10.7298/56f7-aq25 fatcat:ycp4f5ormnab7dwakopn7oxtom

Trust negotiation for authentication and authorization in healthcare information systems

D.K. Vawdrey, T.L. Sundelin, K.E. Seamons, C.D. Knutson
Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (IEEE Cat. No.03CH37439)  
The expanding availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cnst of health care.  ...  This paper describes the use of frust negotiation as a framework for providing authentication and access control services in healthcare information systems. n u s t negotiation enables two parties with  ...  Trust negotiation addresses current authentication and authorization limitations in traditional security systems by creating a framework in which two unrelated parties may establish the: trust sufficient  ... 
doi:10.1109/iembs.2003.1279579 fatcat:fajj4ojs35g5hm2s7txqkiqdzm

11 Back to medical authority: how trust defines the way older people in Sao Paulo search for health information and care

M Duque
2021 Pre-recorded highlight presentations   unpublished
University College London, UK 10.1136/bmjopen-2021-QHRN.10 11 BACK TO MEDICAL AUTHORITY: HOW TRUST DEFINES THE WAY OLDER PEOPLE IN SAO PAULO SEARCH FOR HEALTH INFORMATION AND CARE M Duque.  ...  With this specificity, they can achieve guidance that is at the same time informal and professional, as these friends are medical authorities they feel they can trust.  ... 
doi:10.1136/bmjopen-2021-qhrn.11 fatcat:q4rxfxy4s5dt5pmsfhlxltb6xy

Wikipedia: An opportunity to rethink the links between sources' credibility, trust, and authority

Gilles Sahut, André Tricot
2017 First Monday  
Can I trust this author or source?  ...  It reduces the problem to three concepts: credibility as a characteristic granted to information depending on its truth-value; trust as the ability to produce credible information; authority when the power  ...  Acknowledgements The authors would like to thank Michael Buckland for his comments on earlier version of this paper. About the authors  ... 
doi:10.5210/fm.v22i11.7108 fatcat:5xiwd2vlwzbr5kw5x6e3nmfk2y

Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework [chapter]

Ragib Hasan, Marianne Winslett
2006 Lecture Notes in Computer Science  
In this paper, we present Synergy, a general purpose information sharing framework that uses trust negotiation to implement scalable authorization in an open environment.  ...  Synergy provides an abstraction for the information sources and consumers to accommodate new trust-aware systems as well as legacy systems.  ...  Another issue is trust: how the resource owners in open systems can trust the clients trying to access those resources. Authorization in such situations needs to be dynamic and content-triggered.  ... 
doi:10.1007/11760146_50 fatcat:lkoorg4oqjg6hakonywpm7dbvu

Taxonomy of trust relationships in authorization domains for cloud computing

Juan M. Marin Perez, Jorge Bernal Bernabe, Jose M. Alcaraz Calero, Felix J. Garcia Clemente, Gregorio Martinez Perez, Antonio F. Gomez Skarmeta
2014 Journal of Supercomputing  
A set of different trust relationships have been identified and modeled, enabling entities to control the information they share with others in the cloud.  ...  Entities can cooperate at different levels of trust, according to their willingness of sharing information.  ...  Acknowledgements This work has been partially funded with support from the Spanish MICINN (project RECLAMO -Virtual and Collaborative Honeynets based on Trust Management and Autonomous Systems applied  ... 
doi:10.1007/s11227-014-1117-x fatcat:fst7lxfo4jf2jpvumpc6qiilye

Perceived Trust in Public Authorities Nine Months after the COVID-19 Outbreak: A Cross-National Study

Daicia Price, Tore Bonsaksen, Mary Ruffolo, Janni Leung, Vivian Chiu, Hilde Thygesen, Mariyana Schoultz, Amy Ostertun Geirdal
2021 Social Sciences  
This study aimed to examine the perceived trust in information provided by public authorities and financial measures put in place to address the impact of COVID-19.  ...  When controlling for all included variables in logistic regression analyses, the likelihood of having trust in the public authorities' information was higher for women, those with higher levels of education  ...  Acknowledgments: The authors acknowledge the time and efforts of the participants when responding to the survey. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/socsci10090349 fatcat:cu7c47f4y5g3njci52zqppamt4

Investigations into Trust for Collaborative Information Repositories: A Wikipedia Case Study

Deborah L. McGuinness, Honglei Zeng, Paulo Pinheiro da Silva, Li Ding, Dhyanesh Narayanan, Mayukh Bhaowal
2006 Workshop on Models of Trust for the Web  
Our work is designed to support representation, computation, and visualization of trust information. We have grounded our work in the setting of Wikipedia.  ...  In this paper, we will describe our initial investigations into designing and implementing an extensible trust management layer for collaborative and/or aggregated repositories of information.  ...  We would also like to thank Cynthia Chang and Richard Fikes for valuable conversations and implementations.  ... 
dblp:conf/mtw/McGuinnessZSDNB06 fatcat:l6vtpgczj5h6bdmtdlijzien5u

Trust Mediation for Distributed Information Systems [chapter]

Brian Toone, Michael Gertz, Premkumar Devanbu
2003 Security and Privacy in the Age of Uncertainty  
Distributed information systems are increasing in prevalence and complexity as we see an increase in the number of both information consumers and information providers.  ...  Trust mediatioll is a technique we introduce to address this problem by incorporating a model for representing trust into a framework for retrieving information in a distributed system.  ...  In the example shown in Figure 4 , a trust authority analyzes two sources SI and S2 using the trust type "reliable".  ... 
doi:10.1007/978-0-387-35691-4_1 fatcat:dpoq7twhirhv5jiflo5i4dbbzy

Shaping library's social media authority through trust -creating activities: A case of selected academic libraries in Nigeria

Joshua Sani Magoi, A. Abrizah, M.K. Yanti Idaya Aspura
2020 Malaysian Journal of Library & Information Science  
This study describes how academic librarians strategize in creating trust in social media contents and orient their actions towards the goals of achieving social media authority as information experts.  ...  Another two themes are associated with trust-creating activities by librarians as a group: (a) collaborate in assessing social contents; (b) be an authority in library and information services.  ...  ACKNOWLEDGEMENT This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.  ... 
doi:10.22452/mjlis.vol25no1.5 fatcat:w4jaumsx3ran3mkklixaagq2zm
« Previous Showing results 1 — 15 out of 1,326,598 results