Sciweavers

1117 search results - page 76 / 224
» A Compliance Model of Trust
Sort
View
112
Voted
NSPW
2004
ACM
15 years 7 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
DISCEX
2003
IEEE
15 years 7 months ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...
AAAI
1996
15 years 3 months ago
The NASA Personnel Security Processing Expert System
The NASA Personnel Security Processing Expert System is a tool that automatically determines the appropriate personnel background investigation required for a civil servant or con...
David Silberberg, Robert Thomas
120
Voted
AINA
2009
IEEE
15 years 8 months ago
Combined On-line and Off-line Trust Mechanism for Agent Computing
In this paper, we propose an efficient mechanism dealing with trust assessment for agent societies, aiming to accurately assess the trustworthiness of the collaborating agents. I...
Babak Khosravifar, Jamal Bentahar, Maziar Gomrokch...
122
Voted
TRUST
2009
Springer
15 years 8 months ago
ACPI: Design Principles and Concerns
Abstract. ACPI (Advanced Configuration Power Interface) allows operating systems to efficiently configure the hardware platform they are running on and deal with power management...
Loïc Duflot, Olivier Levillain, Benjamin Mori...