Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trust
biblio
Integrity based relationships and trustworthy communication between network participants
Submitted by BrandonB on Fri, 05/01/2015 - 9:10am
OSI layer 2
Unicast
trustworthy communication
Trusted Platform Module
Trusted Computing
trust establishment
trust
Servers
security
Protocols
protocol design
Payloads
participating node
authenticated node
operating system integrity
network participants
integrity based relationship
integrity
insider threat
industrial networks
encryption
cyber-physical systems
Cryptographic Protocols
computer network security
authentication protocol
authentication
biblio
Trustworthy Operations in Cellular Networks: The Case of PF Scheduler
Submitted by BrandonB on Fri, 05/01/2015 - 8:54am
Cellular networks
misreporting attack
PF scheduler
trust
biblio
Towards trustworthy complex event processing
Submitted by BrandonB on Thu, 04/30/2015 - 3:05pm
Fault tolerant systems
trustworthy
Trusted Computing
trust
threat analysis
Synchronization
soft realtime computing
Servers
Runtime
mission-critical applications
minimum runtime overhead
Intrusion Detection
intelligent computing
actionable situational knowledge
fault tolerance
event processing operations
Dependable Computing
Context
complex event processing
Byzantine Fault Tolerance
business intelligence
Business
Big Data
application semantics
algorithmic stock trading
biblio
A Fuzzy Clustering-Based Credibility Model for Trust Assessment in a Service-Oriented Architecture
Submitted by BrandonB on Thu, 04/30/2015 - 1:53pm
human computer interaction
web services
Web Service
Trusted Computing
trust assessment
trust
Social network services
service-oriented architecture
Robustness
pattern clustering
majority rating
Clustering algorithms
fuzzy set theory
fuzzy clustering
Equations
customer satisfaction
credibility model
Credibility
consumer ratings
consumer credibility
Computational modeling
Communities
biblio
Shared Experiences of Technology and Trust: An Experimental Study of Physiological Compliance Between Active and Passive Users in Technology-Mediated Collaborative Encounters
Submitted by BrandonB on Thu, 04/30/2015 - 1:50pm
Particle measurements
Trusted Computing
trust in technology
trust
technology-mediated collaborative encounters
shared experiences
Reliability
physiology
physiological compliance (PC)
physiological compliance
passive user
Atmospheric measurements
Optical wavelength conversion
multiuser technological environment
multitask environment
multiprogramming
multiagent systems
Monitoring
Joints
groupware
Group performance
Biomedical monitoring
biblio
A confident email system based on a new correspondence model
Submitted by BrandonB on Thu, 04/30/2015 - 1:47pm
internet
Context
Context modeling
correspondence
correspondence model
Electronic mail
Email
email security
email sender context
email service
email system policy
Human Factors
confident email system
mobile devices
Policy
Postal services
Protocols
security
security of data
trust
Trusted Computing
trusted email system
Confidence
biblio
The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface
Submitted by BrandonB on Thu, 04/30/2015 - 1:39pm
Force
cyber environment
deception
decision maker
Decision Making
C4ISR interface attacking
combat
command and control
command and control systems
cyber attack
cyber deception
Aircraft
information network attack
kinetic deception
Kinetic theory
operational effect
risk management
security of data
sensors
surveillance
Synchronization
trust
biblio
Computing Trust as a Form of Presumptive Reasoning
Submitted by BrandonB on Thu, 04/30/2015 - 1:31pm
presumptive reasoning
Walton argumentation schemes
Trusted Computing
trust schemes
trust model
trust expertise
trust computing
trust
standards
cognition
online communities
Measurement
fuzzy logics
Fuzzy logic
Context
Computational modeling
Communities
biblio
MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks
Submitted by BrandonB on Thu, 04/30/2015 - 1:30pm
social links
Mobile handsets
mobile social networks
mobile users
MSN
nonsemantical trust representation
Pragmatics
real-world mobile dataset
security of data
mobile devices
Social network services
social networking (online)
trust
trust graph
Trust models
trust value evaluation
Trusted Computing
Computational modeling
mobile context aware trust model
mobile context
mobile computing
Mobile communication
MobiFuzzyTrust inference mechanism
linguistic terms
graph theory
fuzzy trust inference mechanism
fuzzy set theory
fuzzy reasoning
fuzzy linguistic technique
fuzzy inference
distributed public virtual social spaces
Context modeling
Context
file
Towards a Science of Trust
Submitted by Dusko P on Wed, 04/29/2015 - 11:12am. Contributor:
Dusko Pavlovic
Testing
Science of Security
University of Hawaii
trust
privacy
HotSoS 2015
Academia
Poster
Presentation
Presentations
Quarter 3: Feb'15 - Apr'15
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
next ›
last »