Sciweavers

2846 search results - page 31 / 570
» Personalization of a Trust Network
Sort
View
ICCCN
2008
IEEE
15 years 4 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
POLICY
2005
Springer
15 years 3 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
AINA
2006
IEEE
15 years 4 months ago
Autonomic Trust Prediction for Pervasive Systems
Pervasive computing is becoming a reality, thanks to advances in wireless networking and increased popularity of portable devices. Users of these devices will need support to deci...
Licia Capra, Mirco Musolesi
SEC
2008
14 years 11 months ago
Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Privat
Every time a user uses the Internet, a wealth of personal information is revealed, either voluntarily or involuntarily. This often causes privacy breaches, specially if the informa...
Indrajit Ray, Sudip Chakraborty
DMSN
2010
ACM
14 years 10 months ago
Provenance-based trustworthiness assessment in sensor networks
As sensor networks are being increasingly deployed in decisionmaking infrastructures such as battlefield monitoring systems and SCADA(Supervisory Control and Data Acquisition) sys...
Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino