Sciweavers

947 search results - page 111 / 190
» HMM-Based Trust Model
Sort
View
92
Voted
ATAL
2005
Springer
15 years 6 months ago
A framework for decomposing reputation in MAS into competence and integrity
In multi-agent communities, trust is required when agents hold different beliefs or conflicting goals. We present a framework for decomposing agent reputation into competence—...
Michael J. Smith, Marie desJardins
ICDCIT
2004
Springer
15 years 6 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
83
Voted
SIGUCCS
1999
ACM
15 years 5 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
CSFW
2011
IEEE
14 years 14 days ago
Formal Analysis of Protocols Based on TPM State Registers
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
121
Voted
EGOV
2011
Springer
14 years 13 days ago
On the Relevance of Enterprise Architecture and IT Governance for Digital Preservation
Digital Preservation has been recognized as a key challenge in providing trusted information and sustainable eGovernment services. However, there has been little convergence on ali...
Christoph Becker, José Barateiro, Gon&ccedi...