Login / Signup
Can Trust be Trusted in Cybersecurity?
Daniel A. Pienta
Stefan Tams
Jason Thatcher
Published in:
HICSS (2020)
Keyphrases
</>
trust relationships
trusted computing
trust model
trust evaluation
virtual organization
artificial intelligence
access control
ad hoc networks
multi party
computing platform
computer security
trust management
database
knowledge base
computing environments
computing systems