Sciweavers

2022 search results - page 285 / 405
» Trust in Multi-Agent Systems
Sort
View
116
Voted
CORR
2007
Springer
121views Education» more  CORR 2007»
15 years 13 days ago
Iterative Filtering for a Dynamical Reputation System
The paper introduces a novel iterative method that assigns a reputation to n + m items: n raters and m objects. Each rater evaluates a subset of objects leading to a n × m rating...
Cristobald de Kerchove, Paul Van Dooren
SIGMOD
2008
ACM
222views Database» more  SIGMOD 2008»
16 years 19 days ago
Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks
This demo presents a privacy-preserving aggregate location monitoring system, namely, TinyCasper, in which we can monitor moving objects in wireless sensor networks while preservi...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
SDMW
2007
Springer
15 years 6 months ago
Requirements of Secure Storage Systems for Healthcare Records
Recent compliance regulations are intended to foster and restore human trust in digital information records and, more broadly, in our businesses, hospitals, and educational enterpr...
Ragib Hasan, Marianne Winslett, Radu Sion
FC
1997
Springer
107views Cryptology» more  FC 1997»
15 years 4 months ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko
94
Voted
PUC
2006
72views more  PUC 2006»
15 years 12 days ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon