找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Autonomic and Trusted Computing; 7th International Co Bing Xie,Juergen Branke,Xingshe Zhou Conference proceedings 2010 The Editor(s) (if ap

[复制链接]
楼主: chondrocyte
发表于 2025-3-23 10:41:07 | 显示全部楼层
发表于 2025-3-23 15:39:30 | 显示全部楼层
A Risk-Aware Resource Service Decision Strategy for Global Computingrmation before providing services for resource requesters. Although many trust management models have been proposed to deal with security concerned in resource service, few of them take risk into consideration. In those schemes involving risk, either risk is discussed conceptually, or methods for ca
发表于 2025-3-23 19:46:13 | 显示全部楼层
Message Race Detection for Web Services by an SMT-Based Analysised by four factors: security, privacy, reliability and business integrity. Web Services use message-passing for communication which opens the door for messages races. Messages race with each other when their order of arrival at a destination is not guaranteed and is affected non-deterministically by
发表于 2025-3-23 22:58:41 | 显示全部楼层
A User-Oriented Approach to Assessing Web Service Trustworthinesserception of users. However accurate assessment for service trustworthiness from user’s perception is a difficult problem, since user perception of a particular Web service varies in terms of users, application scenarios and time. In this paper, we present a user oriented Web service trustworthiness
发表于 2025-3-24 02:45:59 | 显示全部楼层
Improving the Trustworthiness of Service QoS Information in Service-Based Systems are composed of available services. Besides services’ capabilities, the qualities of services (QoS) also need to be considered in service composition in order to have high-quality workflows. The QoS profiles of services provided by their service providers may be inaccurate. In this paper, an approa
发表于 2025-3-24 06:44:26 | 显示全部楼层
Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Softwaretware trustworthiness is presented. Software under evaluation is compared with some predefined norms and is assigned to one of trust levels. The entire evaluating process is described, including definition of problem situation and formulation, determination of the model and its parameters, and the a
发表于 2025-3-24 13:29:08 | 显示全部楼层
发表于 2025-3-24 15:30:38 | 显示全部楼层
发表于 2025-3-24 19:36:32 | 显示全部楼层
Design and Analysis of “Flexible” ,-out-of-, Signaturesnstruction guarantees that a single signer can close at most one ring so the result of the combination is the required (.,.)-ring signature. This construction is useful in, for example, electronic negotiations or games where gradual revelation on how many people signed a given document is required.
发表于 2025-3-25 00:49:52 | 显示全部楼层
0302-9743 and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable c
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 08:36
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表