Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Applying current existing trust models or trust management systems on mobile computing environments require extracting user's trust standards in different contexts, user's experience or feedback dissemination and user's decision about trust or distrust. However mobility, uncertainty and heterogeneity of mobile computing environments make trust management much more complicated, so they are inadequate...
The emergence kinds of Web applications offer flexible and convenient service for users. Though the sites declare they won't disclose users' privacy without user's agreement, users may receive some spam after registered in or interacted with some sites. That is clearly that some sites disclosed user's privacy such as preference with user's email address to the third party by their commerce interests...
The Internet and computers did not invent or even cause privacy issues. The issues existed long before the creation of computers and Internet. The existence of the Internet, computers and large data storage make it possible to collect, process and transmit large volumes of data, including personal data. In this paper, we shall study the privacy from following two different views, namely legal framework...
Information security risk assessment combined with power control process is not a properly resolve problem, the lack of asset identification method accord with characteristics of power information systems is one of the main factors. Network-based substation automation systems (SAS) are typical power information systems, based on the analysis of difficulties on asset identification, a complete information...
Currently, there exist different trust models in peer-to-peer application. Each model has an abundance of trust information about trust and reputation attributes which are needed for establishing trust between peers. These trust models canpsilat be easily interoperable due to no approach for integrating in a semantic way the trust information from different models. Integrating trust information in...
In this paper, we propose a new decision-making approach for C2C electronic trade based on economic theory and relevant trust mechanisms in which we incorporate the element of trust and risk into a single model. During buying, an agent learns to select its partners based on the evaluation of trust on potential partners as well as on its own personal risk attitude. During selling, in order to increase...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.