Abstract—Security needs to be human-centric if the human context and intent have to be known. Security mechanisms should be hidden whenever automation has all information it needs. In this paper, we present a human-centric, assisted trust establishment mechanism over the Internet. This mechanism expands our previous work that required a physical meeting to exchange identities (public keys) and to establish mutual trust. The goal is identification and authentication, which can then be used for authorization. The mechanism was designed to protect privacy while it utilizes existing trust relationships within small social groups to gain evidence of the trustworthiness of a claimed identity. Our technology is in particular suited for inter-conne...
The personal data being published on online social networks is presenting new challenges in sharing ...
The lack of effective trust establishment mechanisms for web services impedes the deployment of trus...
Abstract. In this paper, trust-based recommendations control the exchange of personal information be...
Due to the huge exposure of personal information in social media, a challenge now is to design effec...
The increasing popularity in social network web sites is giving rise to new classes of security and ...
With the advent of new networking paradigms and evolutions, spanning from distributed and self-organ...
The recent decades have witnessed dramatic developments in information and communication technologie...
The increasing popularity in social network web sites is giving rise to new classes of security and ...
trust, privacy, personal systems, obligations, trusted platforms, prime, policies Being able to say ...
Abstract — Every time a user conducts an electronic transaction over the Internet a wealth of person...
It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that rais...
The standard solution for mutual authentication between human users and servers on the internet is t...
The Internet enables connectivity between many strangers- entities that don't know each other. ...
The Internet, which is a global and complex infrastructure, is a mechanism for information sharing a...
We blend research from human-computer interface\ud (HCI) design with computational based crypto-\ud ...
The personal data being published on online social networks is presenting new challenges in sharing ...
The lack of effective trust establishment mechanisms for web services impedes the deployment of trus...
Abstract. In this paper, trust-based recommendations control the exchange of personal information be...
Due to the huge exposure of personal information in social media, a challenge now is to design effec...
The increasing popularity in social network web sites is giving rise to new classes of security and ...
With the advent of new networking paradigms and evolutions, spanning from distributed and self-organ...
The recent decades have witnessed dramatic developments in information and communication technologie...
The increasing popularity in social network web sites is giving rise to new classes of security and ...
trust, privacy, personal systems, obligations, trusted platforms, prime, policies Being able to say ...
Abstract — Every time a user conducts an electronic transaction over the Internet a wealth of person...
It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that rais...
The standard solution for mutual authentication between human users and servers on the internet is t...
The Internet enables connectivity between many strangers- entities that don't know each other. ...
The Internet, which is a global and complex infrastructure, is a mechanism for information sharing a...
We blend research from human-computer interface\ud (HCI) design with computational based crypto-\ud ...
The personal data being published on online social networks is presenting new challenges in sharing ...
The lack of effective trust establishment mechanisms for web services impedes the deployment of trus...
Abstract. In this paper, trust-based recommendations control the exchange of personal information be...