نتایج جستجو برای: mutual trust
تعداد نتایج: 100848 فیلتر نتایج به سال:
A successful transaction of digital contents is primarily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents value chain ecosystem. We first analyzed basic value chain architectures in existence, together with some fundamental security and trust requirements. And then, a state-ofthe-art a...
OBJECTIVES Electronic medical records (EMRs) are increasingly being used by health care services. Currently, if an EMR shutdown occurs, even for a moment, patient safety and care can be seriously impacted. Our goal was to determine the methodology needed to develop an effective and reliable EMR backup system. METHODS Our "independent backup system by medical organizations" paradigm implies th...
What makes security relations stable and, therefore, conducive to permanent peace? When and why is the peace in a region so stable that the outbreak of a major war is unlikely or perhaps even inconceivable? There are essentially two ways to answer these questions; either a given system must possess necessary structural prerequisites of stability, or the social and cognitive conditions of stabil...
Disagreements between psychologists and economists about the need for and size of financial incentives continue to be hotly discussed. We examine the effects of financial incentives in a class of interactive decision-making situations, called centipede games, in which mutual trust is essential for cooperation. Invoking backward induction, the Nash equilibrium solution for these games is counter...
Digital Credentials and Authorization to Enhance Trust in Negotiation within E-Services Marketplaces
In the present economy, business-to-business (B2B) relationships are usually long-termed and characterised by a high degree of mutual preexisting trust. With the advent of the Internet economy, E-Services marketplaces will provide an infrastructure where B2B relationships will be set up in a highly dynamic fashion. The increased dynamism of the marketplace introduces issues of lack of trust amo...
The success of recent massive Internet-based attacks and frauds targeting financial institutions highlights the inadequacy of these institutions when facing such threats in isolation. There is a need for financial players to coordinate their efforts by sharing and correlating suspicious activities occurring at multiple, geographically distributed sites. CoMiFin, an EU funded project, is develop...
OBJECTIVE To investigate the associations of maternal social networks and perceptions of trust with the prevalence of suspected autism spectrum disorders in 18-month-old offspring in Japan. METHODS Questionnaires included measurements of maternal social networks (number of relatives or friends they could call upon for assistance), maternal perceptions of trust, mutual assistance (i.e. individ...
The E-Commerce, as to the nature of the transaction between both parties, is represented in various classifications and includes a framework of computer programs and systems that undertake services in the internet, which are search for information, exchange management, study of rating condition, provision of rating, online payment mode, summary of report and account management. These are the fo...
Trust prediction turns out to be an important challenge when cooperation among intelligent agents with an impression of trust in their mind, is investigated. In other words, predicting trust values for future time slots help partners to identify the probability of continuing a relationship. Another important case to be considered is the context of trust, i.e. the services and business commitmen...
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approaches based on identity or capabilities do not solve the problem of establishing trust between strangers. New approaches to trust establishment are required that are secure, scalable, and portable. One new approach to m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید