Sciweavers

1117 search results - page 193 / 224
» A Compliance Model of Trust
Sort
View
RAS
1998
81views more  RAS 1998»
14 years 9 months ago
Towards a theory of delegation for agent-based systems
In this paper a theory of delegation is presented. There are at least three reasons for developing such a theory. First, one of the most relevant notions of "agent" is b...
Cristiano Castelfranchi, Rino Falcone
ER
2010
Springer
135views Database» more  ER 2010»
14 years 8 months ago
Adaptation in Open Systems: Giving Interaction Its Rightful Place
Abstract. We address the challenge of adaptation in open systems. Open systems are characterized by interactions among autonomous and heterogeneous participants. In such systems, e...
Fabiano Dalpiaz, Amit K. Chopra, Paolo Giorgini, J...
SOCIALCOM
2010
14 years 7 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 7 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
DEBU
2010
127views more  DEBU 2010»
14 years 7 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...