Sciweavers

376 search results - page 5 / 76
» Integrity constraints in trust management
Sort
View
WLP
2005
Springer
15 years 5 months ago
Expressing Interaction in Combinatorial Auction through Social Integrity Constraints
Abstract. Combinatorial Auctions are an attractive application of intelligent agents; their applications are countless and are shown to provide good revenues. On the other hand, on...
Marco Alberti, Federico Chesani, Alessio Guerri, M...
COLCOM
2007
IEEE
15 years 6 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
IDTRUST
2010
ACM
15 years 6 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
103
Voted
CCGRID
2002
IEEE
15 years 4 months ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran
IAT
2008
IEEE
15 years 6 months ago
Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making
The recent emergence of location-based social networking services is revolutionizing web-based social networking allowing users to share real-life experiences via geo-tagged user-...
Touhid Bhuiyan, Yue Xu, Audun Jøsang