Sciweavers

1715 search results - page 126 / 343
» Trust and Reputation Systems
Sort
View
TPDS
2008
116views more  TPDS 2008»
14 years 10 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
SIGOPS
2008
120views more  SIGOPS 2008»
14 years 10 months ago
TVDc: managing security in the trusted virtual datacenter
Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and ap...
Stefan Berger, Ramón Cáceres, Dimitr...
SIGOPSE
2004
ACM
15 years 3 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
AI
2002
Springer
14 years 10 months ago
Using Inter-agent Trust Relationships for Efficient Coalition Formation
We address long-term coalitions that are formed of both customer and vendor agents after evaluating their trust relationships with other agents in the system. We present a coalitio...
Silvia Breban, Julita Vassileva
RR
2007
Springer
15 years 4 months ago
Proof Explanation in the DR-DEVICE System
Trust is a vital feature for the Semantic Web: If users (humans and agents) are to use and integrate system answers, they must trust them. Thus, systems should be able to explain t...
Nick Bassiliades, Grigoris Antoniou, Guido Governa...