Sciweavers

989 search results - page 133 / 198
» An information-based model for trust
Sort
View
ACSAC
2004
IEEE
15 years 2 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
HPCNCS
2007
15 years 14 days ago
A Formal Approach for Identity Management in Federated Web Services
The objective of the proposed work is to formally specify and implement a federated web service model in which the identity management problem and security features are analyzed. ...
S. Chandrasekaran, C. Dinesh, Kartic Ramesh, Al. M...
NIPS
2007
15 years 13 days ago
Bayesian Co-Training
We propose a Bayesian undirected graphical model for co-training, or more generally for semi-supervised multi-view learning. This makes explicit the previously unstated assumption...
Shipeng Yu, Balaji Krishnapuram, Rómer Rosa...
IJISEC
2006
108views more  IJISEC 2006»
14 years 11 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
ATAL
2007
Springer
15 years 3 months ago
Determining confidence when integrating contributions from multiple agents
Integrating contributions received from other agents is an essential activity in multi-agent systems (MASs). Not only must related contributions be integrated together, but the co...
Raphen Becker, Daniel D. Corkill