Sciweavers

72 search results - page 3 / 15
» Trust network analysis with subjective logic
Sort
View
ATAL
2008
Springer
13 years 7 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
PLDI
2006
ACM
13 years 11 months ago
Specifying distributed trust management in LolliMon
We propose the monadic linear logic programming language LolliMon as a new foundation for the specification of distributed trust management systems, particularly the RT framework...
Jeff Polakow, Christian Skalka
WISEC
2010
ACM
14 years 24 days ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
CN
2004
108views more  CN 2004»
13 years 5 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
MEMICS
2010
13 years 18 days ago
Modeling Gene Networks using Fuzzy Logic
Recently, almost uncontrolled technological progress allows so called high-throughput data collection for sophisticated and complex experimental biological systems analysis. Espec...
Artur Gintrowski