Sciweavers

2022 search results - page 335 / 405
» Trust in Multi-Agent Systems
Sort
View
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 4 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
IAT
2007
IEEE
15 years 4 months ago
Privacy Loss in Classical Multiagent Planning
Privacy is often cited as the main reason to adopt a multiagent approach for a certain problem. This also holds true for multiagent planning. Still, papers on multiagent planning ...
Roman van der Krogt
SASO
2007
IEEE
15 years 4 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
SACMAT
2004
ACM
15 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
IWAN
2004
Springer
15 years 3 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood