Sciweavers

ENTCS
2006
123views more  ENTCS 2006»
13 years 4 months ago
Nonmonotonic Trust Management for P2P Applications
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management langua...
Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etal...
CORR
2010
Springer
188views Education» more  CORR 2010»
13 years 4 months ago
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try t...
E. Sathiyamoorthy, N. Ch. Sriman Narayana Iyengar,...
EUROPAR
2010
Springer
13 years 5 months ago
cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks
In a Cyclic Mobile Ad Hoc Network (CMANET) where nodes move cyclically, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggre...
Huanyu Zhao, Xin Yang, Xiaolin Li
CIDR
2009
126views Algorithms» more  CIDR 2009»
13 years 5 months ago
Declarative Reconfigurable Trust Management
In recent years, there has been a proliferation of declarative logic-based trust management languages and systems proposed to ease the description, configuration, and enforcement ...
William R. Marczak, David Zook, Wenchao Zhou, Molh...
WOA
2007
13 years 5 months ago
XML-based Trust Management in MAS
—This work deals with trust management in open and decentralized agent-based environments. Analysis and solutions are geared towards peer to peer networks, intended not just as a...
Agostino Poggi, Michele Tomaiuolo
CSFW
2010
IEEE
13 years 8 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
AUTONOMICS
2007
ACM
13 years 8 months ago
Featuring trust and reputation management systems for constrained hardware devices
Research on trust management systems for wireless sensor networks is still at a very early stage and few works have done so far. It seems that for those works which deal with the ...
Rodrigo Roman, M. Carmen Fernández Gago, Ja...
ACMICEC
2007
ACM
129views ECommerce» more  ACMICEC 2007»
13 years 8 months ago
Modeling trust in e-commerce: an approach based on user requirements
E-commerce is presently operating under its expected capacity, mainly because traders find it very difficult to trust one another online for trading decisions. It is therefore ver...
Alireza Pourshahid, Thomas T. Tran
FC
1998
Springer
96views Cryptology» more  FC 1998»
13 years 8 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
CCS
2000
ACM
13 years 9 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....