Filters








531,147 Hits in 6.8 sec

Research on trusted computing and its development

ChangXiang Shen, HuanGuo Zhang, HuaiMin Wang, Ji Wang, Bo Zhao, Fei Yan, FaJiang Yu, LiQiang Zhang, MingDi Xu
2010 Science China Information Sciences  
and viewpoints towards the existing problems in trusted computing and its future development.  ...  In China, the initiative research of trusted computing is not late, and the achievements are plentiful and substantial. Our country is in the front rank of the world in trusted computing.  ...  It systematically introduce the research and development of trusted computing theory, trusted platform module, trusted computing platform, trusted computing platform testing and evaluation, trustworthy  ... 
doi:10.1007/s11432-010-0069-x fatcat:wgtbdnqdxvdzrch72velqlhj6q

Trust in virtual teams

Ban Al-Ani, David Redmiles, Cleidson R.B. de Souza, Rafael Prikladnicki, Sabrina Marczak, Filippo Lanubile, Fabio Calefato
2013 Proceedings of the 2013 conference on Computer supported cooperative work companion - CSCW '13  
for software tools that support the development of trust during virtual collaborations.  ...  Trust is essential for effective and efficient collaborations to take place and is more challenging when people are unable to meet face-toface.  ...  His research interests lie in the areas of software engineering and computer supported cooperative work, focusing on social software engineering and distributed software development.  ... 
doi:10.1145/2441955.2442029 dblp:conf/cscw/Al-AniRSPMLC13 fatcat:x4dnnw6tqrajlk3sfraj6xwprq

Exploring Stakeholders Perceived Risk and Trust Towards their Intention to Adopt Cloud Computing: A Theoretical Framework

Santoso Wibowo, Sameera Mubarak
2020 Pacific Asia Conference on Information Systems  
The purpose of this proposed research is to identify how human, organization, technology, environment, and information quality factors impact on the perceived risk and trust of the stakeholders towards  ...  The findings of this study will be useful for consumers, practitioners, and policy makers who are involved in utilizing and promoting the adoption of cloud computing among organizations.  ...  In order to do this, a research framework is developed on the basis of TAM, TOE and HOT frameworks.  ... 
dblp:conf/pacis/WibowoM20 fatcat:o5lznomx6rg4reslofwdyaa6c4

Why Trust is Bad for Security

Dieter Gollmann
2006 Electronical Notes in Theoretical Computer Science  
We investigate how the term 'trust' has been used, and re-defined, in computer security, covering Trusted Computing Platforms, Trust Management, Trusted Computing, and Trusted Code.  ...  We conclude that trust is a dangerous word to use as it has manifold and sometimes contradictory meanings.  ...  The development of novel cryptographic mechanisms for trusted computing and the developments of applications that build on trusted computing modules are interesting research areas.  ... 
doi:10.1016/j.entcs.2005.09.044 fatcat:m3z3crjspvb6rl2fwzpggshvju

Recent advances on trusted computing in China

Wei Dong, LiQian Chen
2012 Chinese Science Bulletin  
This article highlights some recent research advances on trusted computing in China, focusing mainly on the methodologies and technologies related to trusted computing module, trusted computing platform  ...  , trusted network connection, trusted storage, and trustworthy software. trusted computing, information security, trustworthy software, research advance Citation:  ...  Meantime, other IT companies in China such as Lenovo and Great Wall were also devoted to developing trusted computers.  ... 
doi:10.1007/s11434-012-5550-z fatcat:nyevowgxtnfyjmhghtwjw5wuuy

Moral responsibility for computing artifacts

F. S. Grodzinsky, K. Miller, M. J. Wolf
2012 Computers & society  
The emphasis in The Rules is that both users and professionals have responsibilities in the production and use of computing artifacts. In this paper, we use The Rules to examine issues of trust.  ...  The Rules" are found in a collaborative document (started in March 2010) that states principles for responsibility when a computer artifact is designed, developed and deployed into a sociotechnical system  ...  Joseph Weizenbaum (1984) and Bill Joy (2000) both argued that developers have a choice in the kinds of computer science research to undertake and the kinds of artifacts to develop.  ... 
doi:10.1145/2422509.2422511 fatcat:akwnen7c6nfsbj7ivff7irxmuq

Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Networks

Guanfeng Liu, Yan Wang, Mehmet A. Orgun, Ee-Peng Lim
2013 IEEE Transactions on Services Computing  
It is the key to the development of computational theories, models, and tools that facilitate economic studies, and the design and construct of economic systems using computing technologies.  ...  In recent years, the scope of social and economic computing has expanded tremendously with almost all branches of computing research and practice strongly feeling its impact.  ...  It is the key to the development of computational theories, models, and tools that facilitate economic studies, and the design and construct of economic systems using computing technologies.  ... 
doi:10.1109/tsc.2011.58 fatcat:ttnxa6z7r5aibbq5n6f6mjftmi

Exploring Individual Trust Factors in Computer Mediated Group Collaboration: A Case Study Approach

Xusen Cheng, Linda Macaulay
2013 Group Decision and Negotiation  
Furthermore, based on the new factors, this paper has also designed an innovative trust traffic light model with suggested steps which could be easily used to help analyze the trust factors development  ...  This paper takes the perspective of individual trust and aims to explore the new trust factors and also their detailed second level trust sub-factors in computer mediated collaboration over time.  ...  Acknowledgments This research thanks the ITMB project, all the participants, and feedback from GDN conference and reviewers.  ... 
doi:10.1007/s10726-013-9340-z fatcat:padqr56en5estcrpzvmyj5aoz4

Vision, needs and requirements for Future Research Environments: An Exploration with Computer Engineer and Science Fiction Author Cixin Liu [article]

Katharina Flicker, Cixin Liu, Florina Piroi, Andreas Rauber, Treloar Andrew, Mingfang Wu, Rui Zhang
2021 Zenodo  
In order to develop and explore visions for research, science and society that give us ways into desirable futures an exploration series to consider different perspectives on how research will be conducted  ...  This document contains the interview with Computer Engineer Cixin Liu.  ...  Thus, we launched an exploration series to elaborate visions on how research will be conducted in the future and to explore different perspectives on research.  ... 
doi:10.5281/zenodo.4906183 fatcat:ijlxpgb5s5b75pko2p3a3vq254

Defining the role of open source software in research reproducibility [article]

Lorena A. Barba
2022 arXiv   pre-print
Reproducibility is inseparable from transparency, as sharing data, code and computational environment is a pre-requisite for being able to retrace the steps of producing the research results.  ...  Reviewing the defining features of open source software (licensing, development, communities), I look for explanation of its success from the perspectives of connectivism -- a learning theory for the digital  ...  For this reason, I do not believe it is possible to develop IT products that fully automate reproducibility, and offer a "one-click solution."  ... 
arXiv:2204.12564v2 fatcat:ate2hagimzdtteiu5kzdbwn7oq

Trust and theWeb � A Decline or a Revival?

Piotr L. Cofta
2019 Journal of Web Engineering  
Amid the stable progress of research in trust in social psychology, economy, and politics, the bleak future of computational trust and trust on Web deserves an analysis.  ...  From there, it explores what it takes to accelerate and stabilise the development of research, and what challenges should be tackled first.  ...  By using a variety of methods, the paper outlined and analysed the history of research efforts related to trust, with special focus on computational trust and trust on the Web.  ... 
doi:10.13052/jwe1540-9589.1781 fatcat:xikw5uvc3vhudmyn2exiyodj7q

Understanding Diversity – The Impact of Personality on Technology Acceptance [chapter]

Kay Behrenbruch, Matthias Söllner, Jan Marco Leimeister, Ludger Schmidt
2013 Lecture Notes in Computer Science  
Research on technology acceptance identified two important factors for the individual decision to accept such kinds of risk: trust and personality traits.  ...  In this paper we present a model that integrates research findings for personality traits and for trust in the context of technology acceptance.  ...  We thank Hesse's Ministry of Higher Education, Research, and the Arts for funding our work as part of the research funding program LOEWE.  ... 
doi:10.1007/978-3-642-40498-6_23 fatcat:6g6a6llzqjc3hjr5ikifsx4zpy

Guest Editorial: Special section on social and economic computing

Fei-Yue Wang, Dongsong Zhang, Katia Sycara
2013 IEEE Transactions on Services Computing  
It is the key to the development of computational theories, models, and tools that facilitate economic studies, and the design and construct of economic systems using computing technologies.  ...  In recent years, the scope of social and economic computing has expanded tremendously with almost all branches of computing research and practice strongly feeling its impact.  ...  It is the key to the development of computational theories, models, and tools that facilitate economic studies, and the design and construct of economic systems using computing technologies.  ... 
doi:10.1109/tsc.2013.34 fatcat:pi6rqzvaube4phd3vs7pgcctbm

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

2016 Chinese Journal of Engineering Science  
defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.  ...  in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active  ...  In major national research projects, the government should provide support to the research on trusted TC technologies based on intellectual property rights to promote the theoretical research on active  ... 
doi:10.15302/j-sscae-2016.06.012 fatcat:ukuurcaranasxjqjuxzphvupf4

A Perspective on the Evolution of the International Trust Management Research Community in the Last Decade [chapter]

Theo Dimitrakos
2012 IFIP Advances in Information and Communication Technology  
Since that era, I have spent the last decade with the international research community on Trust Management serving in various facilitator and leadership roles.  ...  such a conference takes place outside of the mature, developed countries of Europe, North America and Australia/Japan.  ...  " by Jøsang. Computational trust: including for example work on "Trusting Collaboration in Global Computing Systems" by Paddy Nixon and his team, as well as research on "Trust Propagation in Small Worlds  ... 
doi:10.1007/978-3-642-29852-3_24 fatcat:m7rz6g2grnfcxj4zcjvk2jpo2a
« Previous Showing results 1 — 15 out of 531,147 results