Sciweavers

1715 search results - page 106 / 343
» Trust and Reputation Systems
Sort
View
AI
2010
Springer
15 years 1 months ago
Optimizing Advisor Network Size in a Personalized Trust-Modelling Framework for Multi-agent Systems
Abstract. This paper explores potential improvements to Zhang’s personalized trust approach for e-commerce, in particular examining means of optimizing the number of advisors tha...
Joshua Gorner
TRUSTBUS
2004
Springer
15 years 3 months ago
Dynamically Changing Trust Structure in Capability Based Access Control Systems
The functioning of modern IT-systems with autonomously acting components requires an elaborate access control system in which each participant can maintain her own trust structure....
Sandra Wortmann, Barbara Sprick, Christoph Kobusch
RAID
2001
Springer
15 years 2 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
IAT
2010
IEEE
14 years 8 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
OSDI
2006
ACM
15 years 10 months ago
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable
In current commodity systems, applications have no way of limiting their trust in the underlying operating system (OS), leaving them at the complete mercy of an attacker who gains...
Richard Ta-Min, Lionel Litty, David Lie