Sciweavers

1715 search results - page 137 / 343
» Trust and Reputation Systems
Sort
View
CCS
2009
ACM
15 years 4 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
WEBI
2009
Springer
15 years 4 months ago
Adapting Reinforcement Learning for Trust: Effective Modeling in Dynamic Environments
—In open multiagent systems, agents need to model their environments in order to identify trustworthy agents. Models of the environment should be accurate so that decisions about...
Özgür Kafali, Pinar Yolum
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 3 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
ACOM
2006
Springer
15 years 4 months ago
Using Social Commitments to Control the Agents' Freedom of Speech
Communication is essential in multi-agent systems, since it allows agents to share knowledge and to coordinate. However, in open multi-agent systems, autonomous and heterogeneous a...
Guillaume Muller, Laurent Vercouter
WORDS
2005
IEEE
15 years 3 months ago
Enhancing DNS Security using the SSL Trust Infrastructure
The main functionality of the Domain Name System (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, ...
Christof Fetzer, Gert Pfeifer, Trevor Jim