Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
We present the concept and design of Dynamic Automated Metadata Exchange (DAME) in Security Assertion Markup Language (SAML) based user authentication and authorization infrastructures. This approach solves the real-world limitations in... more
    • by 
    •   5  
      Trust ManagementService managementSAMLFederated identity management
    • by  and +1
    •   13  
      OntologyAccess ControlTrust ManagementAutonomy
    • by 
    •   12  
      Distributed ComputingComponent-Based Software Engineering (CBSE)Trust ManagementDecision support system
In recent times, coupled with the emergence of the new cloud paradigm, a number of security related issues have emerged. Therefore, trust and reputation management has become unavoidable challenge in this new cloud computing paradigm.... more
    • by 
    •   9  
      Information SecurityComputer NetworksTrust ManagementComputer Security
Este livro é destinado a estudantes, pesquisadores, profissionais e demais interessados em comércio eletrônico (e-commerce), e faz um resgate histórico do surgimento das compras on-line, sua evolução no decorrer dos anos, além de explanar... more
    • by 
    •   40  
      MarketingInformation SecurityInternet StudiesPrivacy
Although extant literature has shown that formal contracts and relational governance play a key role in interorganizational relationships, the nature of their interplay still remains equivocal. To better understand the relationships... more
    • by  and +1
    •   13  
      ContractsInterorganizational RelationshipsTrustMeta-Analysis and Systematic Review
    • by  and +1
    •   8  
      Distributed ComputingTrust ManagementCloud ComputingSystem Architecture
In this work, we present an adversary model that incorporates side channel attacks in the Indistinguishability Experiment for Adaptive Chosen Ciphertext Attack (CCA2). We propose security assumptions and an attack model for a secure... more
    • by 
    •   25  
      Formal Methods (Formal Verification)Information SecurityWireless CommunicationsPrivacy
San Marino trust law is embedded in a consolidated civil law tradition stretching back to the ius commune system of fiduciary instruments, thereby making it possible to trace, to a large extent, an itinerary related to common law trusts,... more
    • by 
    •   18  
      Comparative LawCivil LawComparative Private LawTrust Management
L’opera, dopo aver passato in rassegna le principali caratteristiche del trust, dell’atto di destinazione e del negozio di affidamento fiduciario nonché le più rilevanti questioni problematiche ad essi relative (capitolo 1), esamina in... more
    • by 
    •   20  
      TrustTrust ManagementEquity and TrustsTrust law
Information overload is a new challenge in e-commerce sites. The problem refers to the fast growing of information that lead following the information flow in real world be impossible. Recommender systems, as the most successful... more
    • by 
    •   31  
      Information SystemsControl Systems EngineeringManagement Information SystemsDatabase Systems
This study aims to elaborate and advance a process approach for studying trust development in inter-personal work relationships examining the aspects of emergence in trust-building process in a team context. As enrichment of... more
    • by  and +1
    •   12  
      TrustNonlinear dynamicsTrust Theory (Evolution of cooperation)Trust Management
This presentation is based on the Reputation Management Certificate Program of the Public Relations Society of America (PRSA) 2017 More info the PRSA Program:... more
    • by 
    •   7  
      Business EthicsCorporate Social ResponsibilityPublic RelationsTrust Management
Studies of innovative behavior (the generation, dissemination, and implementation of new ideas) have generally overlooked the agency perspective on this important type of performance behavior. Guided by social– cognitive theory, we... more
    • by 
    •   4  
      Trust ManagementSelf EfficacySocial Cognitive Learning TheoryInnovative Work Behavior
Due to increasing Financial Crimes in Banking Systems Domain, Supervising on Banking Operations Is More Bolder than before. On other Hand, progress in Information Technology has brought significant changes which resulted in emergence of... more
    • by 
    •   4  
      Trust ManagementVirtual WorldsGRCElectronic Banking
    • by 
    •   3  
      Organizational BehaviorTrust ManagementTeam Management
The purpose of this paper is to develop and analyze the relationship between leadership practices and conceptual innovation. Based on theoretical framework the three hypotheses have been formulated, concerning the links between creativity... more
    • by 
    •   3  
      LeadershipTrustTrust Management
Mobile Ad hoc Network (MANET) is a self-organizing wireless network for mobile devices. It does not require any fixed infrastructure to be configured which makes it more suitable to be used in environments that require on-the-fly setup.... more
    • by 
    •   3  
      Trust ManagementMANET Routing protocolsAODV
Brand experience, direct mail communication, trust and attitudes toward advertising are major antecedents of customers’ satisfaction for a brand and satisfied customers may buy more, accept higher prices and have a positive word-of-mouth... more
    • by  and +1
    •   29  
      CommunicationUser Experience (UX)TrustAdvertising
1. Авторы рассматривают «доверие» как инструментальный концепт для анализа проблем на активно развивающихся сейчас цифровых рынках. 2. Приводится краткий обзор истории исследования концепта «доверия». 3. Вводится оригинальный... more
    • by  and +1
    •   9  
      Digital HumanitiesTrustTrust ManagementDigital Identity
Intrusion Detection System (IDS) is meant to be a software application which monitors the network or system activities and finds if any malicious operations occur. Tremendous growth and usage of internet... more
    • by 
    •   13  
      International organizationsCNC Machine tools programmingLife Cycle AssessmentEnterprise Content Management
It's time to discover a new way for individuals to lead organizations and societies. Trust in a variety of institutions, including governmental and business, is at an all-time low. In order to strengthen society from its foundations, we... more
    • by 
    • Trust Management
11 th International Conference on Cryptography and Information Security (CRYPIS 2022) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
    • by 
    •   16  
      Grid ComputingInformation SecuritySoftware SecurityArtificial Immune Systems
    • by 
    •   9  
      PrivacyTrustTrust ManagementEquity and Trusts
Internet of Things (IoT) has been developed as one of the most significant technology in the future of the Internet, in which the physical objects are transformed into smart objects that can be handled and monitored via the Internet. The... more
    • by  and +1
    •   3  
      Trust ManagementInternet of Things (IoT)Systematic Literature Review (SLR)
El video está disponible en Youtube:https://youtu.be/VRTM3XsVGyo
Conferencia pronunciada en Argentina. Borrador de transcripción editada por Manuel Alcázar.
    • by 
    •   4  
      Organizational TheoryTrust ManagementAction TheoryJuan Antonio Perez Lopez
    • by 
    •   7  
      Distributed ComputingTrust ManagementPublic key cryptographyAuthorisation
Introduction to the book chapter: Interest in trust amongst both human resource management (HRM) scholars and practitioners has grown significantly in recent decades. While studies have identified a range of benefits for both employees... more
    • by 
    •   9  
      TrustIndustrial RelationsEmployment RelationsHuman Resource Management
    • by 
    •   80  
      Critical TheoryManagementMarketingBusiness Ethics
The article discusses the origins of the idea to deploy a territorial defense in Ukraine. The author relies on his own experience of participating in working groups that were created in 2014 at the direction of the National Security and... more
    • by 
    •   4  
      Trust ManagementConflict ManagementMilitiasDigital Crime
    • by 
    •   4  
      Trust ManagementEquity and TrustsTrust lawLaw of trusts
Il ruolo del trust nel panorama italiano viene analizzato grazie alle evidenze empiriche raccolte tra i professionisti del settore. Nella prima parte dell’elaborato, si esamina l’istituto del trust definendo un quadro storico-giuridico... more
    • by 
    •   6  
      FinanceInternational LawBankingTrust Management
Product Service Systems (PSS) with the same purpose may be implemented differently across societies. Due to societies having different socio-cultural issues, social norms, and laws, public systems have evolved in specific ways for... more
    • by 
    •   7  
      Service DesignProduct Service SystemTrust ManagementPublic transportation
Research has revealed service industries’ benefits from customer trust including positive effects on commitment, loyalty, sales effectiveness, and collaborative, cooperative, and successful exchange relationships. Yet, despite the... more
    • by 
    •   15  
      ServicesTrustServices Marketing and ManagementService Quality
This Book is for those who sell. It's about not selling, it's about becoming a shopping architect.
    • by 
    •   10  
      Brand ManagementBrand LoyaltyTrust ManagementCustomer Satisfaction
Hoe to register a trust, details, requirements, etc.
    • by 
    •   4  
      TrustTrust ManagementEquity and TrustsInheritance Law
We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether... more
    • by 
    •   16  
      PrivacyTrust ManagementCryptographyEncryption
Easy Home or Home automation plays a very important role in modern era because of its flexibility in using it at different places with high precision which will save money and time by decreasing human hard work. Prime focus of this... more
    • by 
    •   29  
      Human Computer InteractionComputer Assisted Language LearningInformation SecurityMobile Distributed Systems
The aim of Corporate Social Responsibility (CSR) is to restore one of the most critical resources for businesses’ sustainability: trust. However, the current practice of CSR begs the question whether CSR initiatives restore trust or... more
    • by 
    •   15  
      LeadershipTrustTrust Theory (Evolution of cooperation)Organizational Leadership
Purpose – The purpose of this study is to elaborate theory regarding the reasons why collaboration strategies fail. The relational view posits that supply chain integration can be a source of competitive advantage. Few firms, however,... more
    • by 
    •   4  
      CollaborationChange ManagementTrust ManagementRelationship Management
    • by 
    •   20  
      Dynamical SystemsSocial NetworksPrivacySecurity
Recent advancements in the Internet of Things (IoT) has enabled the collection, processing, and analysis of various forms of data including the personal data from billions of objects to generate valuable knowledge, making more innovative... more
    • by 
    •   5  
      Trust ManagementPrivacy and data protectionBlockchainBlockchain Technologies
At the beginning of the XXI century, human societies are entering a period of "late modernity" characterized by new forms of trust and risk, untransparent social situations and economic, political and cultural globalization. These... more
    • by 
    •   27  
      Expert SystemsExpertiseTrustSocial Capital
The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism... more
    • by 
    •   5  
      Wireless Sensor NetworksTrust ManagementSimulationSecurity Threat Groups
about Trust and LMX Theory.
    • by 
    •   4  
      LeadershipTrust ManagementAuthentic LeadershipEthical Leadership
11th International Conference on Cryptography and Information Security (CRYPIS 2022) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
    • by 
    •   20  
      Artificial Immune SystemsTrust ManagementFuzzy SystemsQuantum Cryptography
India, the growing economic superpower proceeded with lightning speed towards the adoption and successful implementation of e-governance. The Government of West Bengal (federal unit of India) implemented e-governance in pension office... more
    • by 
    •   16  
      TrustInformation/Communication Technologies and DevelopmentTrust ManagementEquity and Trusts