Filters








600 Hits in 4.4 sec

Community Trust Stores for Peer-to-Peer e-Commerce Applications [chapter]

Ahmad H. Fauzi, Hamish Taylor
2011 Communications in Computer and Information Science  
Usage of a cheap and secure community store for trust data provides an effective alternative to conventional trusted third party support services for e-commerce transactions.  ...  In this paper, we propose use of a P2P shared store for trust information to support community based e-commerce applications.  ...  and bootstrapping and policies governing peers membership.  ... 
doi:10.1007/978-3-642-25327-0_37 fatcat:hvqyf4mcnne3dj6ah6sp4ton7u

Real-time Money Routing by Trusting Strangers with your Funds

Martijn de Vos, Johan Pouwelse
2018 2018 IFIP Networking Conference (IFIP Networking) and Workshops  
We explore a new stage in the evolution of digital trust, trusting strangers with your funds. We address the trust issues when giving money to others and relying on them to forward it.  ...  For fraud identification, we leverage our deployed blockchain which gradually builds trust between interacting strangers.  ...  The PSD2 regulation states that trusted third parties (TPPs) can be authorized by end-users to perform financial activities on their behalf [20] .  ... 
doi:10.23919/ifipnetworking.2018.8696786 dblp:conf/networking/VosP18 fatcat:ymwjocloqbg4vcnsb4tbpx4joq

Heterogeneous network-based trust analysis

Manish Gupta, Jiawei Han
2011 SIGKDD Explorations  
The trust analysis under such a framework is considered as heterogeneous network-based trust analysis. This paper will survey heterogeneous network-based trust analysis models and their applications.  ...  Recently there has been work in the data mining community on performing trust analysis based on the data provided by multiple information providers for different objects, and such agents and their provided  ...  in online information sources.  ... 
doi:10.1145/2031331.2031341 fatcat:udbel5jlezg5vh4i67bpl47vtq

TRIVIA: visualizing reputation profiles to detect malicious sellers in electronic marketplaces

Johannes Sänger, Günther Pernul
2016 Journal of Trust Management  
As a consequence, users become skeptical and lose their trust toward the reputation system.  ...  Background and related work Online trust and reputation systems The literature on online trust and reputation systems (TRS) has been growing rapidly within the last two decades.  ...  This type of attacks particularly exploits systems where a registration without any proof of identity is possible.  ... 
doi:10.1186/s40493-016-0026-8 fatcat:7yrjobxgzjbaday4pea3u5kaq4

A meta‐analysis on the trust in agrifood supply chains

Michel T. Q. M. Assis, Maria Raquel Lucas, Maria José M. Rainho
2022 Food Frontiers  
In this sense, the understanding of how trust works in agrifood supply chains is essential to find better paths to improve the functioning of those structures.  ...  The agrifood literature suggests that trust is one of the most prominent and critical aspect for not only the effectiveness of collaboration, but also for improving sustainability performance.  ...  We are grateful for the work of the proof reader of this article, Mr. Marcel Milcent  ... 
doi:10.1002/fft2.137 fatcat:hdhaoqbmfbgzjiiobf7np3abvu

Shopping as a Social Activity: Understanding People's Categorical Item Sharing Preferences on Social Networks

Yu Xu, Michael J. Lee
2018 International Conference on Intelligent User Interfaces  
However, less is known about the impact of shopping activities on people's social relationships.  ...  foundational work in the field and addresses this gap by exploring people's preferences in sharing products and services on social networks, in order to gather knowledge for future design of personalized online  ...  of their postings as proof of their task completion.  ... 
dblp:conf/iui/XuL18 fatcat:gctxn3fg4vg3va7rlbpmn22yvq

Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis [chapter]

Majed Alshammari, Andrew Simpson
2018 Lecture Notes in Computer Science  
TAP allows online users to manage their timeline activities in a privacy-preserving way and use them to bootstrap online trust, e.g., as part of registration to a new service.  ...  In this paper, we introduce Timeline Activity Proofs (TAP) as a new trust factor.  ... 
doi:10.1007/978-3-030-00305-0_16 fatcat:zd4hujroqfcy3d7t2b3e5m3peu

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds

Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, Bryan Ford
2017 USENIX Security Symposium  
Independent witness servers collectively verify conformance of software updates to release policies, build verifiers validate the source-to-binary correspondence, and a tamper-proof release log stores  ...  our CHAINIAC prototype on reproducible Debian packages shows that the automated update process takes the average of 5 minutes per release for individual packages, and only 20 seconds for the aggregate timeline  ...  "Fixing" this weakness would require bringing the offline ROOT keys online, defeating their purpose. Update timeline.  ... 
dblp:conf/uss/NikitinKJGGKCF17 fatcat:3hxlphwt6rbupngtrtku4qain4

Accountable key infrastructure (AKI)

Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perring, Collin Jackson, Virgil Gligor
2013 Proceedings of the 22nd international conference on World Wide Web - WWW '13  
In this paper, we propose AKI as a new public-key validation infrastructure, to reduce the level of trust in CAs.  ...  We propose AKI to make progress towards a public-key validation infrastructure with key revocation that reduces trust in any single entity.  ...  To reduce the load on timeline servers, distributed mirror servers store a copy of the timeline server database to efficiently disseminate information. Discussion.  ... 
doi:10.1145/2488388.2488448 dblp:conf/www/KimHPJG13 fatcat:5nccffrvjncq7pb7luryle644a

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts [article]

Nikki McNeil, Robert A. Bridges, Michael D. Iannacone, Bogdan Czejdo, Nicolas Perez, John R. Goodall
2013 arXiv   pre-print
Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources months before proper classification  ...  The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus  ...  TEXTUAL EVIDENCE OF VULNERABILITIES As a driving example, we consider the following observed sequence of events where a vulnerability and proof of concept exploit is discovered and discussed publicly online  ... 
arXiv:1308.4648v3 fatcat:lgpdn5biyjea5oyv55qlje6l5i

DevID: Blockchain-Based Portfolios for Software Developers

Martijn de Vos, Mitchell Olsthoorn, Johan Pouwelse
2019 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)  
Recruiting developers with appropriate qualifications and skills for this activity is key, yet challenging.  ...  The emergence of the open source software paradigm enabled developers to use code contributions as proof of verifiable technical expertise and to build an online reputation [20] .  ...  By building upon a pairwise distributed ledger, DevID is capable of storing tamper-proof records and does not depend on any trusted party.  ... 
doi:10.1109/dappcon.2019.00030 dblp:conf/dappcon/VosOP19 fatcat:iehnewamxzc7zklnnagkgzlhvi

Developing a system for securely time-stamping and visualizing the changes made to online news content [article]

Waqar Detho
2018 arXiv   pre-print
Therefore, the aim of this thesis is to develop a system that 1) enables decentralized trusted time-stamping of web and news articles as a means of making future manipulation of online information identifiable  ...  However, traditional approaches for trusted timestamping depend on the time-stamping authority's fidelity.  ...  Thus, it is a trusted time-stamp and eventually you have a proof for an online resource.  ... 
arXiv:1802.07285v2 fatcat:muyy3itqibf6hoxrdlubpeznrq

Fostering consumer trust and purchase intention in B2C e-commerce [article]

Siddhi Pittayachawan
2007 unpublished
Current Issues Affecting Online Trust There are several new developments regarding trust that impact on B2C e-commerce and online shopping activities.  ...  As B2C ecommerce develops, risks such as identity theft, fraud, phishing, and hacking activities have emerged affecting trust in online shopping.  ... 
doi:10.13140/2.1.4258.6408 fatcat:ofh3f27bvzaanc6smbfccn4dmq

All Trust Is Local: Empowering Users' Authentication Decisions on the Internet

Tiffany Hyun-Jin Kim
2018
Timeline Servers Approaches in the timeline servers family reduce trust in CAs by utilizing a public log to record all certificate transactions.  ...  One participant also raised the issue that these diagrams may not capture online activities among friends.  ...  Problem Definition In this chapter, we explore how to associate a public key with a physical space, and use this association to help users validate online resources.  ... 
doi:10.1184/r1/6714653.v1 fatcat:3mcjbkf4bvaepgkj5vgrcflria

Deliverable 3.1 First Round Call Documents

Alasdair Reid, Christine Neve, Brook Schofield
2019 Zenodo  
://www.ngi.eu/about/ngi-trust/)  ...  The report compiles the first round call documents as published on 1 February 2019 via the NGI TRUST wiki (https://wiki.geant.org/display/NGITrust/1st+Open+Call+NGI_TRUST) and the NGI4ALL web pages (https  ...  Work-plan and milestones Please insert a GANTT chart or similar flow-chart showing the project timeline per main activity identified in the section above.  ... 
doi:10.5281/zenodo.5767339 fatcat:wkqwt27hobfoxfamdkcgda336y
« Previous Showing results 1 — 15 out of 600 results