Abutment 发表于 2025-3-30 12:00:49

The Security Council and the ICC,a number of proposed schemes. A known vulnerability of these published techniques is the truncation attack. In the truncation attack, either two visited hosts collude to discard the partial results collected between their respective visits, or one revisited server deletes all entries between its two

ordain 发表于 2025-3-30 15:08:04

modeling methodology (UMM) based on UML. However, developing a new UMM model for each small variation in a business process would lead in a multitude of “similar” business processes. Thus, a more generic UMM model together with well-defined constraints for different business environments is a bette

indifferent 发表于 2025-3-30 20:19:14

http://reply.papertrans.cn/31/3001/300060/300060_53.png

sparse 发表于 2025-3-30 20:49:45

https://doi.org/10.1007/b100074Recommender Systems; databases; e-commerce; electronic commerce; modeling; security; trust

expire 发表于 2025-3-31 04:36:07

http://reply.papertrans.cn/31/3001/300060/300060_55.png

Foolproof 发表于 2025-3-31 07:00:33

http://reply.papertrans.cn/31/3001/300060/300060_56.png

Malleable 发表于 2025-3-31 12:32:16

http://reply.papertrans.cn/31/3001/300060/300060_57.png

jagged 发表于 2025-3-31 14:22:18

E-Commerce and Web Technologies978-3-540-30077-9Series ISSN 0302-9743 Series E-ISSN 1611-3349

Critical 发表于 2025-3-31 18:56:19

http://reply.papertrans.cn/31/3001/300060/300060_59.png

Diatribe 发表于 2025-4-1 00:52:00

r peers. This paper first presents a probabilistic approach for evaluating the interaction trust of unfamiliar peers according to their interaction history. In addition, after an interaction, peers can evaluate each other and modify the trust status. Based on it, this paper presents an approach for trust value modification after interactions.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: E-Commerce and Web Technologies; 5th International Co Kurt Bauknecht,Martin Bichler,Birgit Pröll Conference proceedings 2004 Springer-Verla