Sciweavers

341 search results - page 44 / 69
» Trust Representation and Aggregation in a Distributed Agent ...
Sort
View
76
Voted
SAC
2002
ACM
14 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
ATAL
2005
Springer
15 years 3 months ago
A multiagent system manages collaboration in emergent processes
Emergent processes are non-routine, collaborative business processes whose execution is guided by the knowledge that emerges during a process instance. In so far as the process go...
John K. Debenham
70
Voted
SAC
2004
ACM
15 years 3 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
FLAIRS
2010
14 years 10 months ago
Assumption-Based Reasoning for Multiagent Case-Based Recommender Systems
Recommender systems (RSs) are popular tools dealing with information overload problems in eCommerce Web sites. RSs match user preferences with item representations and recommend t...
Fabiana Lorenzi, Francesco Ricci, Mara Abel, Ana L...
ICTAI
2009
IEEE
15 years 4 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu