Sciweavers

1715 search results - page 97 / 343
» Trust and Reputation Systems
Sort
View
ATAL
2008
Springer
14 years 12 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
IWSOS
2007
Springer
15 years 4 months ago
Automated Trust Negotiation in Autonomic Environments
Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devi...
Andreas Klenk, Frank Petri, Benoit Radier, Mika&eu...
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
15 years 3 months ago
The Conceptualization of Trust, Risk and Their Relationship in Electronic Commerce: The Need for Clarifications
In recent years, significant advances have been made in the understanding of trust and risk in electronic commerce. However, in examining the published research, some troublesome ...
David Gefen, V. Srinivasan Rao, Noam Tractinsky
COMPSAC
2002
IEEE
15 years 2 months ago
Trust Services: A Framework for Service-Based Solutions
It is well understood that using a software component methodology can simplify the development and maintenance of systems. Web services allow this vision to be extended allowing c...
Adrian Baldwin, Simon Shiu, Marco Casassa Mont
DBSEC
2009
163views Database» more  DBSEC 2009»
14 years 11 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...