Sciweavers

947 search results - page 44 / 190
» HMM-Based Trust Model
Sort
View
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 7 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
111
Voted
SACMAT
2005
ACM
15 years 6 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
116
Voted
GLOBECOM
2010
IEEE
14 years 10 months ago
Trust Management for Encounter-Based Routing in Delay Tolerant Networks
: We propose and analyze a class of trust management protocols for encounter-based routing in delay tolerant networks (DTNs). The underlying idea is to incorporate trust evaluation...
Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee ...
86
Voted
ESWS
2004
Springer
15 years 6 months ago
Uncertainty in Knowledge Provenance
Knowledge Provenance is an approach to determining the origin and validity of knowledge/information on the web by means of modeling and maintaining information sources and dependen...
Jingwei Huang, Mark S. Fox
97
Voted
ATAL
2009
Springer
15 years 7 months ago
Maintenance-based trust for multi-agent systems
In last years, trust and reputation has been gaining increasing interest in multi-agent systems (MAS). To address this issue, we propose in this paper a maintenance-based trust me...
Babak Khosravifar, Maziar Gomrokchi, Jamal Bentaha...