Sciweavers

2022 search results - page 387 / 405
» Trust in Multi-Agent Systems
Sort
View
CCS
2008
ACM
14 years 11 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
AP2PC
2007
Springer
14 years 11 months ago
Information Sharing among Autonomous Agents in Referral Networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek and provide services, or refer other service providers. Key applications include service discove...
Yathiraj B. Udupi, Munindar P. Singh
CCS
2010
ACM
14 years 10 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
ENTCS
2008
101views more  ENTCS 2008»
14 years 9 months ago
Hedaquin: A Reputation-based Health Data Quality Indicator
A number of applications based on personal health records (PHRs) are emerging in the field of health care and wellness. PHRs empower patients by giving them control over their hea...
Ton van Deursen, Paul Koster, Milan Petkovic
JIPS
2007
223views more  JIPS 2007»
14 years 9 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson