Sciweavers

2022 search results - page 248 / 405
» Trust in Multi-Agent Systems
Sort
View
84
Voted
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 7 months ago
Connected Giving: Ordinary People Coordinating Disaster Relief on the Internet
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...
109
Voted
ATAL
2004
Springer
15 years 6 months ago
RDS: Remote Distributed Scheme for Protecting Mobile Agents
As of today no solely software-based solution that a priori protects the computation of any mobile code and/or mobile agent was presented. Furthermore, Algesheimer et al. [1], arg...
Asnat Dadon-Elichai
129
Voted
ESORICS
1994
Springer
15 years 4 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
FC
2006
Springer
108views Cryptology» more  FC 2006»
15 years 4 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
CSFW
2010
IEEE
15 years 4 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu