- 1.Chokhani, S., "Trusted Products Evaluation," Comm. of Lhe A CM, Vol. 35, No. 7, July 1992, pp. 64-76. Google ScholarDigital Library
- 2.Denning, P. J., "What is Software Quality?" Comm. of the A CM, Vol. 35, No. 1, Jan. 1992, pp. 13-15. Google ScholarDigital Library
- 3.Department of Defense, "Trusted Computer System Evaluation Criteria," DOD 5200.28-STD, December 1985.Google Scholar
- 4.Lipner, Steven B., "Criteria, Evaluation, and the International Environment: Where Have We Been, Where Are We Going?" Proc. IFIP-SEC '91; also in RISKS-FORUM Digest 12.46, October 1991.Google Scholar
- 5.Petroski, H., "Making Sure," Americal~. Scieutist, Vol. 80, March-April 1992, pp. 121-124.Google Scholar
- 6.Petroski, H., To Engineer is Human, The Role of Failure in Successful Design, Vintage Books, 1992.Google Scholar
Recommendations
Introducing trusted third parties to the mobile agent paradigm
Secure Internet programmingThe mobile agent paradigm gains ever more acceptance for the creation of distributed applications, particularly in the domain of electronic commerce. In such applications, a mobile agent roams the global Internet in search of services for its owner. One ...
Trusted kernel-based coalition formation
AAMAS '05: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systemsWe define Trusted Kernel-based Coalition Formation as a novel extension to the traditional kernel-based coalition formation process which ensures agents choose the most reliable coalition partners and are guaranteed to obtain the payment they deserve. ...
Why do we trust new technology? A study of initial trust formation with organizational information systems
Recent trust research in the information systems (IS) field has described trust as a primary predictor of technology usage and a fundamental construct for understanding user perceptions of technology. Initial trust formation is particularly relevant in ...
Comments