• No results found

[PDF] Top 20 The Role of Identity in Pervasive Computational Trust

Has 10000 "The Role of Identity in Pervasive Computational Trust" found on our website. Below are the top 20 most common "The Role of Identity in Pervasive Computational Trust".

The Role of Identity in Pervasive Computational Trust

The Role of Identity in Pervasive Computational Trust

... of pervasive sensors but focus on the tech- nological aspects of privacy protection in trust/risk-based security frameworks (TSF), especially techniques to control the dissemination of personal informa- ... See full document

13

Development of the Coach Identity Prominence Scale: A role identity model perspective

Development of the Coach Identity Prominence Scale: A role identity model perspective

... of identity prominence has four properties worthy of examination when considering the definition of identity prominence: a) complex, b) organization of the self, c) enduring, and d) ...of identity ... See full document

162

Determinants of Individual Trust in Global Institutions: The Role of Social Capital and Transnational Identity

Determinants of Individual Trust in Global Institutions: The Role of Social Capital and Transnational Identity

... transnational identity variable are consistently robust and negative: those who identify themselves as belonging to a group that lies be- yond national borders are less likely to trust global institutions ... See full document

10

Features of the Formation of the Corporate Identity of the Staff

Features of the Formation of the Corporate Identity of the Staff

... whose role models are used as examples for ...of role models in organizations having powerful corporate culture, is considered an effective method of promoting corporate ... See full document

13

Language of self-definition in the disorders of identity

Language of self-definition in the disorders of identity

... of dialogue; in some cases it is the site of consensus, in others, that of struggle. In choosing among the various linguistic resources available (and not so available) to us in our roles, we attempt to mould them for ... See full document

9

Privacy, Security, & Trust within the Context of Pervasive Computing pdf

Privacy, Security, & Trust within the Context of Pervasive Computing pdf

... in pervasive computing, where no central authority is legitimate, is the fact that it is hard to verify that a sole person has created many identities who blindly recommend one of these entities in order to fool ... See full document

182

1.
													Developing secured framework for data sharing in public cloud computing

1. Developing secured framework for data sharing in public cloud computing

... Kavitha Margret (2013) analyzed the main problems regarding the sharing of resources within the public cloud computing environment. Based on cloud access control policies the data sharing is carried out within the ... See full document

7

The Role of the Arab World in the Liberation  War of Bangladesh

The Role of the Arab World in the Liberation War of Bangladesh

... the Bangalees by the Pakistan military was like the head hiding camel bird. It was Pakistani Propaganda which was mainly responsible for their attitude like this. Yahya was able to sell his ideas to the Arab leaders that ... See full document

11

The Role of the UN Secretariat in light of th...

The Role of the UN Secretariat in light of th...

... Article 7 enlists the Secretariat as one of the principal organs of the UN. 11 According to Article 97 of the UN Charter, the Secretariat is composed of the Secretary-General and the staff. The Secretariat is entrusted ... See full document

14

A Trust Based Approach for Security and User Confidence in Pervasive Computing Systems

A Trust Based Approach for Security and User Confidence in Pervasive Computing Systems

... a trust show that fuses different security challenges looked by any cloud application or administration is ...The trust model can be going about as a benchmark or positioning administration for deciding a ... See full document

8

The Role of the Dumai City Government in the Use of Reducing Poverty

The Role of the Dumai City Government in the Use of Reducing Poverty

... Abstract:- This study aims to describe various factors that cause poverty in Dumai City. This study also aims to analyse the role of the Dumai City Government in its efforts to reduce poverty at the research site. ... See full document

12

MADRASAH MARKETING MANAGEMENT FORMULATION IN IMPROVING THE TRUST OF STAKEHOLDERS

MADRASAH MARKETING MANAGEMENT FORMULATION IN IMPROVING THE TRUST OF STAKEHOLDERS

... Imam Machali (2016, p. 2) explains that one of the educational institutions that provides Islamic services is a Madrasah. The position of Madrasah is faced by various challenges. The main challenge is in improving the ... See full document

14

Attack-Tolerant Cooperative Spectrum Sensing Algorithm for Faded and Low-Power Primary User Signal Detection Over Cognitive Radio Networks

Attack-Tolerant Cooperative Spectrum Sensing Algorithm for Faded and Low-Power Primary User Signal Detection Over Cognitive Radio Networks

... distributed computational trust evaluation algorithm is proposed which can be deployed by each CR node to assign to each cooperative node (neighbour node) a trust factor [ ] that determines the ... See full document

8

Authorization management for pervasive computing

Authorization management for pervasive computing

... or pervasive (as it has been known since the mid-1990s) computing paradigm envisioned by Mark Weiser [Wei91] ap- proaches computing from a human-centric, non-intrusive viewpoint: The most profound technologies are ... See full document

229

The role of the endocannabinoid system in the pathophysiology of mood disorders

The role of the endocannabinoid system in the pathophysiology of mood disorders

... role of the endocannabinoid system in the neurobiology of mood disorders. Many animal studies suggest that the direct or indirect (i.e., endocannabinoid reuptake inhibition or reduced enzymat- ic degradation) ... See full document

14

Architecture Supporting Computational Trust Formation

Architecture Supporting Computational Trust Formation

... As for the adaptation of the SCOUT services to changing computational trust formation needs, initially the different factors (Section 4.1.6) were implemented as input parameters that can be configured by ... See full document

208

Towards a Formal Framework for Computational Trust

Towards a Formal Framework for Computational Trust

... (probabilistic) model for principal behaviour at the outset, and then put forward algo- rithms for approximating such behaviour and thus making predictions. In such models the trust information about a principal ... See full document

10

The Effectiveness of the Role of Universities in Building the Entrepreneurial Community in Indonesia

The Effectiveness of the Role of Universities in Building the Entrepreneurial Community in Indonesia

... With more and more residents into self-employment, then their economy will be independent, not to be dependent on the capitalist economic system, in this case the Government has to be pro active provides capital for ... See full document

9

The Influence of Transformational Leadership on Innovation of Universities: The Mediating Role of Trust in Leader

The Influence of Transformational Leadership on Innovation of Universities: The Mediating Role of Trust in Leader

... a role model and prompt high levels of trust in his followers ...high trust in their ...the trust of followers ...of trust in the followers. As trust results when the follower ... See full document

8

Trust lifecycle management in ad-hoc collaborations

Trust lifecycle management in ad-hoc collaborations

... Trust in Ad-hoc Collaborations 3 www.smartlab.cis.strath.ac.uk Pervasive and Global Computing ƒ Credential-based versus evidence-based trust management ƒ Implicit view of trust as delega[r] ... See full document

16

Show all 10000 documents...